Hi Folks,
What are we using to secure single point-to-point links? - viz WEP, but
actually secure..
AIUI, Ad-Hoc mode must be used for backbones, but this leaves security
to be done at the IP level - not really good enough.
I have read-up on IPSec, but that seems to be about tunneling all the
Steve Wright wrote:
Hi Folks,
What are we using to secure single point-to-point links? - viz WEP, but
actually secure..
AIUI, Ad-Hoc mode must be used for backbones, but this leaves security
to be done at the IP level - not really good enough.
I have read-up on IPSec, but that seems to be abou
Steve
At 11:24 18.07.2003 +1200, Steve Wright wrote:
Hi Folks,
What are we using to secure single point-to-point links? - viz WEP, but
actually secure..
AIUI, Ad-Hoc mode must be used for backbones, but this leaves security to
be done at the IP level - not really good enough.
I have read-up o
Steve Wright wrote:
Hi Folks,
etc etc..
replied offlist my mistake. sorry - I'm not used to the list server
sending replies offlist.. 8-}
any additional comments appreciated.
regards,
Steve
---
This SF.net email is sponsored by: VM Ware
Steve Wright wrote:
Charles Steinkuehler wrote:
I recently tried setting up something like this between a couple of
Dachstein boxes, and I've since fallen back to simply firewalling both
ends of the wireless link and treating it like a hostile network. It
would be possible with my current setu