Planning and Design Considerations

When deploying a protected 802.11 wireless network solution, you must consider the following for planning and design issues:

  • Wireless security technologies

  • Wireless authentication modes

  • Intranet infrastructure

  • Wireless AP placement

  • Authentication infrastructure

  • Wireless clients

  • PKI

  • 802.1X Enforcement with NAP

Wireless Security Technologies

Wireless security technologies are a combination of a wireless security standard (WPA2 or WPA) and an EAP authentication method. To authenticate the computer or the user that is attempting to make a protected wireless connection, Windows Server 2008 and Windows Vista support the following EAP authentication methods:

  • EAP-TLS

  • Protected EAP (PEAP)-TLS

  • PEAP-Microsoft Challenge Handshake Authentication ...

Get Windows Server® 2008 Networking and Network Access Protection (NAP) now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.