A fundamental component of RADIUS is a client's validation of the RADIUS server's identity.
This is accomplished by hosting a certificate on the RADIUS server that has been validated by a trusted Certificate Authority (CA).
Both methods use strong authentication, which can be based on client certificates. Note: Refer to the "Blueprints" section of this book for network maps of the two recommended wireless network architectures.
Protocols like Wireless Application Protocol (WAP), Voice over IP (Vo IP), and i-mode reside in this layer.
Many security problems can be traced back to the end user in wired networks.
If using OS X, sometimes it can take up to 10 seconds for authentication to complete.
This can occur if the if the RADIUS certificate, or any certificate in the chain, is configured or CRL or OCSP.
You may notice that the “Truman Secure Wireless” network has been found, but due to specific settings needed for a complete connection to the Truman Network this will not allow a proper connection. – A free virus program courtesy of Truman State can be downloaded here.* You will not be prompted for your username and password or to validate the server certificate every time you connect.