ALL >> Computers >> View Article
The Typical Wireless Network Configuration Consists Of An Access Point—a Server That Connects Clie

The typical wireless network configuration consists of an access point a server microsoft exams that connects clients to an internal network and client computers. Figure 12-1 shows this arrangement, which is known as a Basic Service Set (BSS). The wireless access point serves as a bridge between the wireless and wired network.
When a wireless network is configured in this manner, any wireless client that can successfully connect to the wireless AP is connected to the internal network. When several APs are used but are connected to the same wireless network, the arrangement is known as an Extended Services Set (ESS). The ESS creates a single logical network segment and is identified by a single Service Set Identifier (SSID). An example ESS is shown in Figure 12-2. Security consists of wireless AP controls, as discussed later in the section 70-270 Exam titled "The Process: Designing Security for Wireless Networks."
A more secure approach requires the wireless client to use a virtual private network (VPN) to access the internal network. ...
... Figure 12-3 shows this arrangement. In the fig-ure, note the use of a firewall to protect the internal network from potential attacks from unauthorized wireless clients.
When a VPN is required in order to access the internal network, client-to-server communications can be secured, as can the wired network.
Another approach uses a RADIUS server and the 802.Ix authentication protocol to provide additional security both at the AP and at the juncture of wireless and wired networks. As shown in Figure 12-4, Microsoft Internet Authentication Seiver (IAS) can be used as the authentication server in this arrangement. In the figure, the dotted lines represent the request for connection from the wireless client to the AP, which then must go to IAS and be authenticated by Active Directory.
If you don't design and implement secure wireless networks, unsecured wireless networks will appear across the enterprise. Unsecured wireless networks allow unauthorized and unauthenticated access to your corporate network from both harmless guests who wish to free test questions piggyback on your connection to the Internet and from attackers.
Add Comment
Computers Articles
1. Web Scraping Top Grocery Chains In MichiganAuthor: FoodDataScrape
2. How Refurbished Laptops Help Students Save Money And Study Smarter In 2025
Author: usedstore
3. Why The Ls3002 Barcode Scanner Is Perfect For Retail In 2025
Author: prime pos
4. Does Cleaning Temporary Files Really Improve Laptop Speed? (what To Expect)
Author: Neha Jain
5. Extract Supermarket Data From Walmart & Target In Usa
Author: FoodDataScrape
6. How Odoo Partners Drive Growth: From Implementation To Innovation
Author: Alex Forsyth
7. Leverage Web Scraping Cold Drinks Data On Swiggy Instamart
Author: FoodDataScrape
8. Empowering Universities Through Student Engagement Crm Solutions|e2s
Author: Brenda Joyce
9. Odoo Manufacturing And Lean Practices For Small And Medium Enterprises
Author: Alex Forsyth
10. How Posiflex Pos Machines Enhances Customer Service
Author: pbs
11. Scrape Keeta Food Delivery App Data In Saudi Arabia For Insights
Author: FoodDataScrape
12. Microsoft Office Professional Plus 2021 Vs. Microsoft Office Professional Plus 2024: Which One Should You Choose?
Author: davudobuya55
13. Microsoft Office Professional Plus 2019 Vs. Microsoft Office Professional Plus 2019 Dvd: Which Version Should You Choose?
Author: davudobuya55
14. Microsoft Office Professional 2024 Vs. Microsoft Office Professional Plus 2010: Which One Is Right For You?
Author: davudobuya55
15. Microsoft Office Home Business 2021 For Mac Vs Microsoft Office Home Student 2021 For Mac: Which Is Right For You?
Author: davudobuya55