Executive Briefing: Wireless Network Security

White Paper
Wireless Network Security
Three Levels of Wireless Security
11
Figure 3 VPN Security and 802.1x Authentication Used Together
Figure 3. VPN security used in conjunction with 802.1X authentication.
Another consideration that must be weighed is the additional costs and administration overhead associated
with VPNs. Traditionally, VPNs have been used for remote access to corporate networks in a low throughput
environment. With a wireless network, one should plan for much more traffic, as a result of a local presence,
direct access, network environment. Consideration should also be given to the scalability costs and
requirements as the wireless access, traffic, and number of users expand in future months.
VPN Gateway
/Firewall
Access Point
Client
VPN
Secured
Network
VPN
Client
Wireless
Server
Security
802.1x