How To Secure WLANs: A Visual Overview

, March 26, 2013 Secure wireless networks don't just happen--users and IT pros have to make it happen. But what goes into making a wireless network secure? Here's a look some essential steps for locking down wireless communications, including advice for road warriors, small business owners and WLAN administrators running large networks.
  • E-mail

Use RADIUS for Enterprise WLAN Clients

A typical business WLAN uses 802.1x authentication and WPA2 encryption. A range of configuration choices are available under 802.1x, but they all use common RADIUS underpinnings. Wireless client devices are supplicants, access points or controllers are authenticators, and a RADIUS authentication server is either populated with user credentials or queries Active Directory (or LDAP) for user verification.

Network Computing encourages readers to engage in spirited, healthy debate, including taking us to task. However, Network Computing moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing/SPAM. Network Computing further reserves the right to disable the profile of any commenter participating in said activities.

Disqus Tips To upload an avatar photo, first complete your Disqus profile. | Please read our commenting policy.