I have a lot of clients who have wireless networks. They’re typically outside the firewall for open guest access. Some people use WPA and WPA2 for encryption and authentication. I haven’t seen much in the way of policies and very minimal controls to detect rogue systems.
We have also kept wireless out of firewall and with a minimal settings the visitors in our building are able to use it