Wireless Switch Architecture a Ploy?
Is the latest standard at risk? Not if you implement best practices in your network, wireless or otherwise.
August 13, 2004
1 Min Read
Still concerned? Make sure your management traffic, including RADIUS, is isolated from your user traffic and edge-network infrastructure. Use secrets that have more than eight characters and include nonalphanumeric values. For the paranoid, rotate the shared secrets on a regular basis, and encrypt the traffic via IPsec.
Is the latest 802.11i standard at risk? Not if you implement best practices in your network--wireless or otherwise.
Read more about:
2004SUBSCRIBE TO OUR NEWSLETTER
Stay informed! Sign up to get expert advice and insight delivered direct to your inbox
You May Also Like
More Insights
Webinars