Securing Wireless Access Using IAS

Access to your network via 802.11 wireless access points (APs) should be considered as a form of remote access. Unlike wired LANs and WANs, the wireless network boundary can easily and unintentionally extend beyond your organization's perimeters and, by default, is also available to anyone visiting your organization that has a wireless access card and appropriate computing device. Laptop computers and PDAs now come with wireless network cards, and for those that do not have a card, many inexpensive cards are available.

By default, little to no security is imposed on wireless network APs; thus, wireless networks can pose serious threats to the security of wired networks. There are security features provided with ...

Get Windows Server 2003 Security: A Technical Reference now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.