Wireless network implementation
In this section, we will begin to tie all the components together that ensure a successfully secured wireless network implementation. The previous sections introduced terminology, provided history, and set the stage for the recommendations presented in this section. We will discuss the recommended configuration for an enterprise wireless implementation including wireless signal leakage, client configuration, encryption, authentication, using certificates, and other security considerations.
Wireless signal considerations
An important element of wireless network implementation is signal strength and limiting signal leakage. The wireless signal must be strong enough to provide the coverage necessary to be useful. However, it's range must also be limited to ensure the wireless signal is not reachable too far from the physical boundaries of the enterprise. There are many reasons to attempt striking the balance of signal strength and limiting the range. These include...