Planning and Design Considerations
When deploying a protected 802.11 wireless network solution, you must consider the following for planning and design issues:
Wireless security technologies
Wireless authentication modes
Intranet infrastructure
Wireless AP placement
Authentication infrastructure
Wireless clients
PKI
802.1X Enforcement with NAP
Wireless Security Technologies
Wireless security technologies are a combination of a wireless security standard (WPA2 or WPA) and an EAP authentication method. To authenticate the computer or the user that is attempting to make a protected wireless connection, Windows Server 2008 and Windows Vista support the following EAP authentication methods:
EAP-TLS
Protected EAP (PEAP)-TLS
PEAP-Microsoft Challenge Handshake Authentication ...
Get Windows Server® 2008 Networking and Network Access Protection (NAP) now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.