
|
Operational Objectives (3/3) STA Admission Control Access control needs to be based on both switching and wireless medium segments e.g. control based on congestion and radio interference Trust Model Definition Considerations for separation of authenticator and encryption locations Security Borderline Control (Desirable) Mutual security between logical groups Centralized WTP Management (Rejected) Protocol to be provisioned for WTPs not managed by AC |