O'Reilly logo

Windows Server® 2008 Networking and Network Access Protection (NAP) by Microsoft Networking Team, Tony Northrup, Joseph Davies

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Planning and Design Considerations

When deploying a protected 802.11 wireless network solution, you must consider the following for planning and design issues:

  • Wireless security technologies

  • Wireless authentication modes

  • Intranet infrastructure

  • Wireless AP placement

  • Authentication infrastructure

  • Wireless clients

  • PKI

  • 802.1X Enforcement with NAP

Wireless Security Technologies

Wireless security technologies are a combination of a wireless security standard (WPA2 or WPA) and an EAP authentication method. To authenticate the computer or the user that is attempting to make a protected wireless connection, Windows Server 2008 and Windows Vista support the following EAP authentication methods:

  • EAP-TLS

  • Protected EAP (PEAP)-TLS

  • PEAP-Microsoft Challenge Handshake Authentication ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required