Wireless Switch Architecture a Ploy?

Is the latest standard at risk? Not if you implement best practices in your network, wireless or otherwise.

August 13, 2004

1 Min Read
NetworkComputing logo in a gray background | NetworkComputing

Still concerned? Make sure your management traffic, including RADIUS, is isolated from your user traffic and edge-network infrastructure. Use secrets that have more than eight characters and include nonalphanumeric values. For the paranoid, rotate the shared secrets on a regular basis, and encrypt the traffic via IPsec.

Is the latest 802.11i standard at risk? Not if you implement best practices in your network--wireless or otherwise.

Read more about:

2004
SUBSCRIBE TO OUR NEWSLETTER
Stay informed! Sign up to get expert advice and insight delivered direct to your inbox

You May Also Like


More Insights