By now, you've read all about the 802.11 protocol, its many weaknesses, and some of the native solutions for deploying a secure network. The remainder of this book is designed to help you deploy wireless securely in a variety of configurations. Common to all of these configurations is the point at which the wireless network touches the wired network. This is where the rubber meets to road.
In this chapter, we will review some basic architectural concepts, including VPNs, 802.1x, and firewalls.