9.6. WLAN VPN

Unlike RADIUS authentication, adding VPN tunneling to a WLAN provides both authentication and encryption. Requiring access to a WLAN through a VPN is a relatively new method of security, but one that is gaining a lot of support.

A WLAN VPN is implemented by adding a NAS server between the network and the access point, as shown in Figure 9.4. A WLAN user connects to the access point, and the request is forwarded to the NAS. The NAS handles the authentication and encryption of data and creates the tunnel. Once a user has been successfully authenticated against the NAS server, a tunnel is created and encrypted data is freely transmitted between the user and the network.

Figure 9.4. Securing a WLAN using a VPN. The WLAN user creates ...

Get The Practice of Network Security: Deployment Strategies for Production Environments now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.