In this paper we introduce the technique to secure WLAN
using WPA2 Enterprise, firewall captive portal, and
certification techniques as shown in figure 1. The
network topology in fig.1 is a regular network for
medium office. In general, the medium office has three
subnets in their office. So that we build the network
topology that has three subnets and several servers.