One objection to using it on a DMZ is that it then becomes more visible to the outside world. A few good reasons to use a DMZ is for web or e-mail servers, or possibly a VPN, if you keep the wireless behind or within your router I think is the best choice. If you use NAT (Network Address Translation) then it is even more difficult to get into your network. One idea we were thinking here is using a server to authenticate wireless accounts to allow access to the trusted network. Separating them by using VLAN security which the Cisco AP's support with firmware 12.00 and up.