Review of the security-relevant configuration of a WLAN infrastructure