Chapter 3: Scenarios & Selection

Eight real-world deployment scenarios with technical specifications, key performance indicators, and selection guidance


Wireless security requirements vary significantly across deployment environments. Each scenario presents unique challenges in terms of device diversity, user behavior, regulatory requirements, physical environment, and threat landscape. This chapter presents eight representative deployment scenarios, each with a real-world site photograph, detailed description, and key technical performance indicators to guide system design and product selection decisions.

A
Corporate Headquarters — Multi-Role Enterprise Office
Corporate Headquarters Wi-Fi Security Deployment
Figure 3.1: Corporate Headquarters — Open-plan office with WPA3-Enterprise, Corp/Guest/IoT VLAN segmentation, and WLAN Controller + RADIUS infrastructure

The corporate headquarters scenario represents the most common and complex enterprise Wi-Fi deployment. It encompasses managed staff devices (laptops, phones), contractor BYOD, meeting room AV systems, building IoT (HVAC, lighting, access control), and occasional guest users. The primary security challenge is enforcing strict role separation while maintaining seamless roaming across floors and meeting rooms. WPA3-Enterprise with EAP-TLS is mandatory for managed endpoints, with EAP-TTLS/PEAP fallback for legacy devices. Dynamic VLAN assignment ensures each device class lands in the appropriate network zone with firewall-enforced east-west isolation.

WPA3-Enterprise
Air Interface Security
EAP-TLS
Primary Auth Method
<200ms
Roaming Latency Target
4 VLANs
Corp / BYOD / IoT / Guest
15–25 clients/AP
Typical AP Load
WIDS Active
Rogue AP Detection
B
R&D Laboratory — High-Security Restricted Zone
R&D Laboratory Wi-Fi Security Deployment
Figure 3.2: R&D Laboratory — Tamper-resistant APs, EAP-TLS mandatory, dedicated Lab VRF with strict egress, WIPS monitoring

R&D laboratories require the highest level of wireless security due to the presence of sensitive intellectual property, prototype devices, and specialized test equipment. Only managed devices with valid enterprise certificates are permitted to connect. The lab operates on a dedicated VRF with strict egress filtering — only approved application destinations are reachable. Physical security is integrated with logical security: door access control events are correlated with Wi-Fi authentication events in the SIEM. Dedicated RF sensors provide continuous WIPS monitoring to detect any unauthorized wireless activity within or near the lab perimeter.

EAP-TLS Only
No Fallback Permitted
Dedicated VRF
Lab Network Isolation
Allowlist Egress
Outbound Traffic Control
Tamper-Proof AP
Physical Security
WIPS + Sensors
Continuous RF Monitoring
SIEM Correlated
Physical + Logical Events
C
Logistics Warehouse — IoT and Handheld Device Environment
Warehouse Wi-Fi Security Deployment
Figure 3.3: Logistics Warehouse — Directional APs on aisle poles, IoT VLAN / Handheld VLAN separation, barcode scanner and sensor connectivity

Logistics warehouses present unique RF challenges: long narrow aisles with metal shelving create multipath interference, and the device population is dominated by handheld barcode scanners and IoT inventory sensors that may not support 802.1X. The design uses directional antennas mounted on aisle poles to maximize coverage depth while minimizing inter-aisle interference. Handheld scanners authenticate via PPSK with per-device keys, landing in the Handheld VLAN. IoT sensors use DPPSK with ACL-based allowlists restricting communication to the inventory management server only. Forklift-mounted terminals require seamless roaming with 802.11r to maintain WMS connectivity during movement.

Directional AP
Aisle-Optimized Coverage
PPSK/DPPSK
IoT Auth Method
ACL Allowlist
IoT Egress Control
802.11r FT
Forklift Roaming
2 VLANs
IoT + Handheld Separation
IP67 AP
Dust/Moisture Protection
D
Public Lobby & Event Space — High-Density Guest Access
Public Lobby Wi-Fi Security Deployment
Figure 3.4: Corporate Lobby — High-density APs, captive portal guest authentication, Guest VRF internet-only, RF spectrum monitoring

Public lobbies and event spaces require high-density AP deployment to serve hundreds of concurrent guest devices, while maintaining strict isolation from the corporate network. The guest SSID uses a captive portal with sponsor approval or time-limited access codes. All guest traffic is routed through a dedicated Guest VRF with internet-only access — no RFC1918 addresses are reachable. DNS filtering blocks malicious domains and inappropriate content. RF spectrum monitoring detects evil twin APs that may attempt to impersonate the official guest SSID. Security signage and user notifications educate visitors about safe Wi-Fi practices.

Captive Portal
Guest Authentication
Guest VRF
Internet-Only Access
DNS Filtering
Content Control
100+ clients/AP
High-Density Design
RF Monitoring
Evil Twin Detection
Time-Limited
Session Expiry Policy
E
Healthcare Facility — Medical IoT and Clinical Wi-Fi
Healthcare Wi-Fi Security Deployment
Figure 3.5: Hospital Corridor — Medical-grade APs, Medical IoT VLAN isolation, HIPAA-compliant logging, clinical device authentication

Healthcare environments combine clinical staff mobility with a large population of medical IoT devices — infusion pumps, patient monitors, portable imaging systems — that require reliable wireless connectivity for patient safety. HIPAA compliance mandates strict access controls, comprehensive audit logging, and encryption of all patient data in transit. Medical IoT devices are isolated in a dedicated VLAN with strict ACLs permitting only communication with the clinical information system. Clinical staff authenticate via EAP-TLS with MDM-managed certificates. Network availability is critical: redundant APs and controllers ensure no single failure disrupts patient care operations.

HIPAA
Compliance Framework
Medical IoT VLAN
Device Isolation
EAP-TLS + MDM
Clinical Staff Auth
99.99% Uptime
Availability Target
Full AAA Logs
Audit Trail
Redundant HA
Controller Failover
F
University Campus — Outdoor Multi-Building eduroam
University Campus Wi-Fi Security Deployment
Figure 3.6: University Campus Outdoor — Weatherproof APs on lamp posts, eduroam 802.1X, campus SSID with student/staff/IoT segmentation

University campuses present a unique combination of outdoor coverage requirements, high device diversity (student laptops, phones, research IoT), and federated authentication via eduroam. Outdoor APs must be weatherproof (IP67) and mounted on lamp posts or building walls to provide seamless coverage across open areas, pathways, and courtyards. eduroam uses 802.1X with EAP-TTLS/PAP or EAP-TLS, allowing students and staff from partner institutions to authenticate using their home institution credentials. Research IoT devices on outdoor testbeds use dedicated SSIDs with strict ACLs. The campus security office monitors RF spectrum for rogue APs and unauthorized hotspots.

eduroam
Federated Auth
IP67 Outdoor AP
Weatherproof Enclosure
802.11k/v
Roaming Optimization
Multi-SSID
Student/Staff/IoT/Guest
RF Monitoring
Rogue Hotspot Detection
-40°C to 65°C
Operating Temperature
G
Manufacturing Plant — OT/IT Converged Industrial Wi-Fi
Manufacturing Plant Wi-Fi Security Deployment
Figure 3.7: Manufacturing Plant — Ruggedized industrial APs, OT Network air-gap protection, IT/OT firewall separation, SCADA device isolation

Manufacturing environments require ruggedized wireless infrastructure capable of operating in high-temperature, high-vibration, and electromagnetically noisy environments. The critical security challenge is maintaining strict separation between the OT (Operational Technology) network — PLCs, SCADA systems, robotic controllers — and the IT network. Industrial APs with IP67/NEMA4X enclosures are mounted on poles and ceiling brackets. OT devices communicate on a dedicated SSID with strict ACLs permitting only SCADA protocol traffic. An industrial firewall enforces the OT/IT boundary. Any wireless intrusion into the OT zone triggers immediate alerts and automated containment to prevent production disruption or safety incidents.

IP67/NEMA4X
Industrial AP Rating
OT/IT Firewall
Zone Separation
SCADA ACL
Protocol Allowlist
-40°C to 70°C
Industrial Temp Range
Vibration-Proof
Mechanical Durability
IEC 62443
OT Security Standard
H
Hotel & Hospitality — Per-Room Guest Isolation
Hotel Wi-Fi Security Deployment
Figure 3.8: Hotel Lobby and Guest Floor — Decorative APs, captive portal check-in, Guest VRF per-room isolation, corridor AP distribution

Hotels must provide high-quality guest Wi-Fi while ensuring complete isolation between guest rooms — preventing one guest from accessing another's devices or traffic. Per-room client isolation is enforced at the AP level using proxy ARP and client-to-client blocking. The guest SSID uses a captive portal with room number and last-name authentication linked to the property management system. Each guest session is assigned a unique VLAN or VRF ensuring complete traffic isolation. Hotel staff use a separate SSID with 802.1X authentication for operational systems. The network management console provides real-time visibility into AP health, client counts, and security events across all floors.

Per-Room Isolation
Client-to-Client Block
PMS Integration
Captive Portal Auth
Guest VRF
Internet-Only Access
Decorative AP
Aesthetic Enclosure
Staff SSID
802.1X Separate Auth
PCI-DSS
Payment Data Compliance

3.1 Scenario Selection Matrix

The following matrix summarizes the key security design choices across all eight scenarios, enabling rapid comparison and selection guidance for new deployments.

Scenario Primary Auth Network Zones Key Security Feature Compliance AP Type
A. Corporate HQEAP-TLS + EAP-TTLSCorp / BYOD / IoT / GuestDynamic VLAN + WIDSISO 27001Indoor ceiling
B. R&D LabEAP-TLS onlyLab VRF (strict)Allowlist egress + WIPSIP/Trade SecretTamper-resistant
C. WarehousePPSK/DPPSKIoT + HandheldDirectional AP + ACLOperationalDirectional/IP67
D. Public LobbyCaptive PortalGuest VRF onlyDNS filter + RF monitorGDPRHigh-density
E. HealthcareEAP-TLS + MDMClinical / Medical IoTHIPAA logging + HAHIPAAMedical-grade
F. Universityeduroam 802.1XStudent / Staff / IoTFederated auth + outdoorFERPAOutdoor IP67
G. ManufacturingPPSK + 802.1XOT / IT separatedOT/IT firewall + SCADA ACLIEC 62443Industrial NEMA4X
H. HotelCaptive Portal + PMSGuest VRF per-roomClient isolation + PCIPCI-DSSDecorative ceiling