Planning and Design Considerations

When deploying a protected 802.11 wireless network solution, you must consider the following for planning and design issues:

  • Wireless security technologies

  • Wireless authentication modes

  • Intranet infrastructure

  • Wireless AP placement

  • Authentication infrastructure

  • Wireless clients

  • PKI

  • 802.1X Enforcement with NAP

Wireless Security Technologies

Wireless security technologies are a combination of a wireless security standard (WPA2 or WPA) and an EAP authentication method. To authenticate the computer or the user that is attempting to make a protected wireless connection, Windows Server 2008 and Windows Vista support the following EAP authentication methods:

  • EAP-TLS

  • Protected EAP (PEAP)-TLS

  • PEAP-Microsoft Challenge Handshake Authentication ...

Get Windows Server® 2008 Networking and Network Access Protection (NAP) now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.