Microsoft White Paper – Secure Wireless Access Point Configuration
In this white paper you will receive guidance about configuring wireless access points to support Wi-Fi protected access (WPA) and configuring the required supporting network infrastructure.
Businesses that have deployed wireless networks usually have many concerns about the security of their solution, whereas businesses that have shied away from wireless technology worry about the obvious productivity and infrastructure savings they may have missed. Well-publicized flaws were discovered in the first generation of IEEE 802.11 WLAN security protocols. Even though many workarounds have been developed through the years, the typical solutions offered to address wireless security issues have either been too costly or have had their own inherent flaws. As the technology has matured to allow for higher speeds and more reliability, the standards used to secure wireless transmissions have also matured. The latest wireless security protocols, WPA and WPA2, based on the IEEE 802.11i standard, help provide strong protection for wireless traffic even in the most rigorous security environments. These current standards, when configured properly, are much more secure and can be used with a high level of confidence in a midsize business environment. This guidance discusses the challenges that midsize businesses face when considering wireless networks, and provides valuable information to design and implement an effective solution for securing a Wireless Access Point (WAP). The solution for securing a midsize business wireless network includes:
· Assessing WLAN Security
· Developing a Secure WLAN Solution
· Deployment and Management