The document discusses a wireless network security system that uses rogue access point detection, encrypted tunnels, identity-based firewalls, and a mobility controller with additional security software to provide protection for wireless devices and legacy access points connected to a layer 2 network.