Summary

The intent of this chapter was to provide some best-practice examples of how to deal with some of the operational and design challenges of deploying secure WLANs. The chapter provided guidance on how to handle rogue AP detection and how to scale RADIUS and VPN services and gave the reader options for handling guest access. As always, the best practices that the network designer decides to implement depend upon his particular environment.