Best practices in WLAN security hinge on your specific security needs and the technologies you choose to satisfy those needs. Not long ago, the complaint heard about wireless LAN security was that ...
WPA brings several security improvements to the airwaves. WPA uses Temporal Key Integrity Protocol (TKIP), which replaces WEP's 40-bit static key with a 128-bit dynamically assigned key. That ...
WLAN switches have deposed the intelligent access points of yesteryear. Are they really better? And which WLAN switch is best? Three years ago, when we launched the Advanced Network Computing ...
During the past few weeks, I’ve dedicated a significant amount of time to creating wireless LAN (WLAN) policies and standards. A WLAN site survey I conducted a few weeks ago convinced me to accelerate ...
IT managers tend to look at wireless local area networks, or WLANs, much like adults view groups of loud teenagers — with at least a little bit of trepidation and sometimes some fear as well. That’s ...
For some time now, there's been no question in my mind that the best route to establishing a secure wireless LAN goes through an AAA server. Also known as a remote authentication dial in user service ...
A new version of Vernier Networks’ WLAN security and management software could be a major step forward in simplifying wireless deployments, according to one beta tester. A new version of Vernier ...
The recent proliferation of high-speed wireless portable devices has resulted in a significant demand for wireless LAN. While WLANs offer tremendous flexibility to the mobile user, compared with their ...
Wireless connectivity offers many benefits: quick setup, untethered employees, networking flexibility, and relatively low costs. JP Gorsky, product line manager for Enterasys said, “I think one of the ...
Recent global events have emphasized the need for adequate security—both in the real world and in cyberspace. Hacking into a wireless 802.11b network is often easy. In fact, it's too easy. So how do ...