The times, they are a changing. IAP and AP SKUs become one.Read More Aruba UAP Boot Process
No podcast/blogpost this week, as I’m out living it up in Nashville with some of the best and brightest minds in the wireless networking industry! They’ve revealed a lot of exciting new features in just the first day, ranging from the ambitious machine learning based security on the internal network to the practical new wired tunneling […]Read More Atmosphere 2017
Welcome to the first Packet Wrangling podcast! In this episode, we take a quick look at spectrum analysis technology and discuss why it’s important both for new deployments and to troubleshoot existing installations.Read More PacketWrangling Podcast – Spectrum Analysis
I’ve been involved in a number of planning meetings for IT infrastructure refreshes – servers, storage, WAN, networking, wireless, you name it. Most of the time the requirements are more or less well-defined and well thought out… number of hosts, exact processors, memory requirements, connectivity to the storage arrays, VLAN assignments, and so on. All […]Read More It’s 2017 – Stop Guesstimating!
As discussed in an earlier blog WPA2 Enterprise allows a network to authenticate each user with unique credentials, rather than a blanket passphrase. This is done through an EAP exchange over the 802.1X framework. We’ve touched on this briefly in a post about RBAC, but I wanted to take some time to review two of […]Read More Exploring EAP
So, today I passed the Certified Wireless Security Professional (CWSP) exam. For those of you not familiar with the CWNP program, it’s an intensive vendor-neutral certification path that delves deeply into 802.11 tech… VERY deeply. It’s been very beneficial for my career, and it’s one of the few educational courses that I truly enjoy. Anyone […]Read More Thoughts on the CWSP…
Wireless is great because it gives you mobility – you can get your work done just about anywhere these days (which is both a good and a bad thing)! But there is an inherent drawback to mobility as wireless traffic is unbounded. It flows in all directions and eavesdropping on private conversations is both easy […]Read More Understanding Wireless Encryption