Chapter 11
Additional Intranet Wireless Deployment Configurations
Chapter 8, Intranet Wireless Deployment Using EAP-TLS, and Chapter 10, Intranet Wireless Deployment Using PEAP-MS-CHAP v2, describe the typical secure intranet wireless deployments using either Extensible Authentication Protocol-Transport Layer Security (EAP-TLS) or Protected EAP-Microsoft Challenge Handshake Authentication Protocol version 2 (PEAP-MS-CHAP v2) and a set of two Internet Authentication Service (IAS) servers. This chapter describes the following additional intranet wireless deployment configurations:
Internet access for business partners
Cross-forest authentication
Using RADIUS proxies to scale authentications
Using both EAP-TLS and PEAP-MS-CHAP v2 authentication