To secure wireless access, Figure 7-4 show that all wireless access points (devices that accept incoming wireless communicatioms and permit the sending device to connect to the organization’s network)
Should be located in the DMZ. This treats all wireless access as if it was coming in from the Internet and forces all wireless traffic to go through the main firewall and any intrusion prevention systems that are used to protect the perimeter of the internal network. In addition, the following procedures need to be followed to adequately secure wireless access: