You might want to do some reading about WPA and 802.1x protocols.
The idea is that a host trying to connect to wired or wireless network
needs to authenticate in order to enable the port it is connecting to
(we are talking here about layer 2 authentication). 
The approach gives you a wide choice of authentication methods like
EAP-TLS, PEAP, smart cards, certificates, etc...

The open source implementation of 802.1x can be found here:
http://www.open1x.org/
 
Just my 2 cents...

Guy

On Wed, 2005-01-05 at 11:17 +0200, Shachar Shemesh wrote:
> Geoffrey S. Mendelson wrote:
> 
> >Always use WEP (encryption) 64 bit is good enough. It is NOT to
> >keep your data secure, don't ever assume that it will be,
> >but to keep people from using your network to send spam or
> >"share" kidde porn.
> >
> Actually, I was seriously considering not using it. The idea is that, 
> since WEP is so weak, I might as well do without altogether. Any host 
> wishing to do anything at all on my network, including browsing the 
> internet, will need to have openvpn installed and configured. Once 
> that's the case, there is no extra benefit from using WEP.
> 
>               Shachar
> 


=================================================================
To unsubscribe, send mail to [EMAIL PROTECTED] with
the word "unsubscribe" in the message body, e.g., run the command
echo unsubscribe | mail [EMAIL PROTECTED]

Reply via email to