Wireless Operational Security
V
Vendor-assisted hacking, 90
Verification, 149 “50
Violations Reporting Policy, 164
Virtual Ethernet Interface (VEI), 261
Virtual Local Area Networks (VLANs), 187 “88
configuration, 189 “90
support, 187
Virtual Private Networks (VPNs), 240 “60
advantages, 240, 241
concentrators , 262
connections, 242, 245
disadvantages, 242
industry acceptance, 242
IPSec/IKE, 249 “53
L2TP/IPSec, 247 “49
Layer 3, 243
linking, 240
Mobile IP and, 258 “60
over wireless medium, 241
port forwarding and, 255
PPTP, 246 “47
public key authentication and, 256 “58
RADIUS and, 292
redirection, 245
secure shells and, 254 “55
servers, 244
SFTP and, 253, 256
solution considerations, 243 “44
SSH2, 253
tunneling, 241
types, 244 “53
value, 272
in WLANs, 244
Virtual Router Redundancy Protocol (VRRP), 268
Virus incidents, 217
Voice communications, authority to intercept, 102
Voice-mail communications, 102 “3
Voice over IP (VoIP), 303