Deploying Secure 802.11 Wireless Networks with Microsoft Windows

Components of a RADIUS Infrastructure for Public Place Wireless Access

Public place wireless access consists of the organizational entities listed below and shown in Figure 13-1.

From a RADIUS perspective, the relevant portions of infrastructure are the following:

To provide authentication, authorization, and accounting for its own customers, the WISP can configure its RADIUS proxy computers to act as both a RADIUS proxy (for wireless clients that have benefactors) and a RADIUS server (for wireless clients that either have an existing account with the WISP or enroll with the WISP upon their initial connection).

To ensure the maximum security for RADIUS messages, it is recommended that you use Internet Protocol security (IPSec) with certificate authentication and Encapsulating Security Payload (ESP) to provide data confidentiality, data integrity, and data origin authentication for RADIUS traffic sent between all the RADIUS components. The most important RADIUS traffic to secure is that sent across the Internet. Windows 2000 and Windows Server 2003 support IPSec. To secure RADIUS traffic sent from wireless APs, the wireless APs must also support IPSec. If any of the RADIUS components are behind a Network Address Translator (NAT), you must use IPSec NAT traversal (NAT-T). Windows Server 2003 supports IPSec NAT-T.

Категории