8. Summary and Conclusions
This chapter began with a description of how 802.1X wireless LAN security works. To provide focus for the design, a picture of the target enterprise for the implementation of the wireless network security plan development was given along with the enterprise’s key design criteria for the WLAN solution. Following this, the main aspects of the chosen WLAN design were discussed. The design covered the network; IAS server placement and IAS configuration; the use of certificates; and, the different types of wireless clients. The key points on migration from an existing WLAN were also outlined.
Finally, the two parts at the end of the chapter discussed important variations to the basic design. Firstly, how to scale the implementation of the wireless network security plan development for larger enterprises was described, along with instructions on how to deal with the main points of divergence from the core implementation of the wireless network security plan development. This was followed by illustrations of how to use the same basic authentication infrastructure to support other network services such as remote access, VPN, and wired network security; and, how to deal with the sticky problems of bootstrapping clients and deploying WLANs to SOHO environments.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
9. References
“Securing Wireless LANs with PEAP and Passwords: Planning a Wireless LAN Security Implementation,” Microsoft TechNet, © 2005 Microsoft Corporation. All rights reserved. Microsoft Corporation, One Microsoft Way, Redmond, WA 98052-6399, April 3, 2004.
John R. Vacca, Firewalls: Jumpstart for Network and Systems Administrators, Digital Press, 2004.
John R. Vacca, Public Key Infrastructure: Building Trusted Applications and Web Servicess, Auerbach Publications, 2004.
Rights and permissions
Copyright information
© 2006 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
(2006). Implementation Plan Development. In: Guide to Wireless Network Security. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-29845-0_10
Download citation
DOI: https://doi.org/10.1007/978-0-387-29845-0_10
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-95425-7
Online ISBN: 978-0-387-29845-0
eBook Packages: Computer ScienceComputer Science (R0)