Meraki MR34 Cloud Managed AP MR34-HW Prospecto

Los códigos de productos
MR34-HW
Descargar
Página de 13
Introduction
Wireless Security Threats in an Enterprise Environment
Secure WiFi access has become a critical component of enterprise networking. WiFi Internet 
access is critical for corporate communication in verticals including financial services, retail, and 
distributed enterprise. Due to the widespread use of WiFi and variety of use cases (e.g., point-of-
sale (POS) communications, corporate access, warehouse inventory, asset tracking, WiFi services 
for targeted advertising), the wealth of information transmitted across the wireless medium 
has skyrocketed. Data transmitted over wireless increasingly contains sensitive personal and 
financial data. Unfortunately, the tremendous growth in wireless has been accompanied with 
an increasingly widespread ability to obtain open-source hacking tools that can compromise a 
wireless network through impersonation of client devices and access points.
Examples of common threats in a modern WiFi environment include:
Network impersonation: achievable by purchasing any consumer-grade access point and 
copying an SSID, “tricking” clients into thinking that this SSID is available and snooping on their 
information transactions. 
Figure 1: Example of SSID spoofing threat in a retail environment
Legitimate SSID
Malicious SSID
Unsuspecting user  
connects to malicious 
SSID
Cisco Systems, Inc.  |  500 Terry A. Francois Blvd, San Francisco, CA 94158  |  (415) 432-1000  |  sales@meraki.com
3