This column is the third in our series on why we think the Financial Accounting Standards Board is mistaken in its exposure draft on the hierarchy of accounting principles. For those who may have ...
I’m using PEAP in a Microsoft-centric environment as an authentication method for my wireless LAN. What steps should I use to secure my deployment? PEAP is a common authentication option for wireless ...
Protected Extensible Authentication Protocol, better known as PEAP is a protocol that adds an extra layer of security to wireless LANs and point-to-point connections with PEAP passwords. The protocol ...
Hey all, I've been reading up on getting Wireless 802.1x + PEAP in a domain environment for a while now. One thing I never really understood was that if you wanted to also use that same wifi ...
I'll start with the background. We have wireless deployed in certain locations at work. It's currently setup using WPA2-Enterprise with AES encryption and the authentication is EAP-TLS. All our ...
It’s strange. Our company has yet to embrace wireless as a global deployment, yet every couple of months, the number of access points seems to double. The other day, I received a call from one of the ...
If the challenge of securing a wireless LAN wasn't already confusing enough, things have just gotten worse. The confusion started last month when the Wi-Fi Alliance changed the WPA and WPA2 standards ...