Deploying Secure 802.11 Wireless Networks with Microsoft Windows

Required Components

The following components are required for an intranet wireless deployment using EAP-TLS:

Figure 8-1 shows the components of EAP-TLS authentication.

CAUTION If you use EAP-TLS authentication, do not also use Protected EAP-TLS (PEAP-TLS) for wireless connections. Allowing both protected and unprotected authentication traffic for the same type of network connection renders the protected authentication traffic susceptible to spoofing attacks.

Figure 8-1. The components of EAP-TLS authentication.

Категории