When deploying a protected 802.11 wireless network solution, you must consider the following for planning and design issues:
Wireless security technologies
Wireless authentication modes
Wireless AP placement
802.1X Enforcement with NAP
Wireless security technologies are a combination of a wireless security standard (WPA2 or WPA) and an EAP authentication method. To authenticate the computer or the user that is attempting to make a protected wireless connection, Windows Server 2008 and Windows Vista support the following EAP authentication methods:
Protected EAP (PEAP)-TLS
PEAP-Microsoft Challenge Handshake Authentication ...