Wireless technologies continue to grow with no sign of slowing down. Today, companies need to understand the advances in wireless security standards so they can easily integrate wireless ...
When WEP's flaws became apparent, the wireless industry started developing new protocols to address the published weak points. These new protocols grew up around the IEEE 802.1x framework, which is a ...
Is there such a beast? I've got a heterogenious environment (Linux, Windows, Solaris, VMware) with laptops, workstations and servers, and it's time to implement 802.1x. I'll probably start with the ...
802.1x Port-Based Security Once the weaknesses in WEP became clear, the industry set to work to produce an improved method for protecting authentication transactions and securely exchanging WEP keys.
Somehow I'm managed to navigate the whitepapers and all the good/bad advice out there with relatively little hassle have a working WPA/802.1x/PEAP implementation against an IAS server in our AD. I've ...
If I implement 802.1X on my Ethernet switch ports, do I still have to worry about rogue access points? Rogue access points are like cockroaches; they’re everywhere, they’re impossible to get rid of, ...
Currently, the Wi-Fi Alliance, which certifies wireless LAN products for interoperability, tests hardware components only. However, the multivendor consortium has said it will soon likely also certify ...
Connecting to wireless networks using the enterprise or 802.1X mode of Wi-Fi security is a bit different compared to using the personal or pre-shared key (PSK) mode. Though connecting to enterprise ...
Axis Communications, a pioneer in network video, announces the support for the IEEE 802.1AE MACsec security standard in the latest release of the Axis operating system, AXIS OS 11.8, for more than 200 ...
Last month, I covered the 802.11 wireless standard and the various options available for wireless networking. This time, let’s look at the principles of securing ...