Planning and Design Considerations
When deploying a protected 802.11 wireless network solution, you must consider the following for planning and design issues:
Wireless security technologies
Wireless authentication modes
Intranet infrastructure
Wireless AP placement
Authentication infrastructure
Wireless clients
PKI
802.1X Enforcement with NAP
Wireless Security Technologies
Wireless security technologies are a combination of a wireless security standard (WPA2 or WPA) and an EAP authentication method. To authenticate the computer or the user that is attempting to make a protected wireless connection, Windows Server 2008 and Windows Vista support the following EAP authentication methods:
EAP-TLS
Protected EAP (PEAP)-TLS
PEAP-Microsoft Challenge Handshake Authentication ...
Get Windows Server® 2008 Networking and Network Access Protection (NAP) now with the O’Reilly learning platform.
O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.