We use wireless authentication for the purposes of protecting the link layer...
authenticated users are still outside the privileged corprate network and
therefore need to vpn in.
joel
On Jun 9, 2011, at 3:02 PM, eric clark wrote:
> Wondering what people are using to provide security from thei
You could always take the route of not trusting the wireless network at all.
Users who get to wireless can only go to the Internet.
Put all the APs in a DMZ.
Users who can open up a VPN to your microsoft vpn servers can authenticate
and get to the corporate network.
This is the way things were d
Tokens are an option but I should have been more clear.
As we're a windows shop (apologies, but that's the way it is), we were
planning on going with user credentials and the machine's domain
certificate. Your solution might still be viable, but I'm not certain if I
can get at the machine certs wi
On Thu, Jun 9, 2011 at 3:02 PM, eric clark wrote:
> Wondering what people are using to provide security from their Wireless
> environments to their corporate networks? 2 or more factors seems to be the
> accepted standard and yet we're being told that Microsoft's equipment can't
> do it. Our syst
Wondering what people are using to provide security from their Wireless
environments to their corporate networks? 2 or more factors seems to be the
accepted standard and yet we're being told that Microsoft's equipment can't
do it. Our system being a Microsoft Domain... seemed logical, but they can
5 matches
Mail list logo