We sometimes focus more on the wireless side of the network when it comes to security because Wi-Fi has no physical fences. After all, a war-driver can detect your SSID and launch an attack while sitting out in the parking lot.
Stories by Eric Geier
There are endless software tools and utilities out there to help you in managing your network. Here are some of the best free ones. They can help you with deploying, maintaining, troubleshooting, and upgrading Window Servers, your domain, and aid with other miscellaneous network tasks.
All five tested products validate the superior throughput of 802.11ac
Whether you’re in IT or an average end user, here’s what you need to know about the changes and new features.
Earlier this year we tested several consumer-level 802.11ac routers. Here, we take a look at two enterprise-level access points. They're a part of the so-called "Wave 1" phase of the 802.11ac standard: both access points support up to three spatial streams and 80 MHz wide channels, offering theoretical data rates up to 1.3Gbps. But just as we saw with the 802.11ac routers, you won't get throughput rates nearly that fast.
Offering Wi-Fi can be a good way to increase return customers and boost revenue in retail stores, hotels, cafes, etc. And it provides convenience for contractors and associates working in corporate offices and conference rooms. Though visitors might have 4G mobile devices or laptops, Wi-Fi can provide a faster, higher quality connection.
Ekahau offers most comprehensive set of Wi-Fi site survey features in three-product test
In the early days of Wi-Fi, site surveys were fairly basic and involved running around with a laptop looking at simple signal levels. The next step was mapped-based tools that provided a good visual of Wi-Fi coverage, but still involved carrying a bulky laptop around.
Deploying the enterprise mode of Wi-Fi Protected Access (WPA2) with 802.1X authentication provides great Wi-Fi security, but complicates the client configuration and connection process. In bring-your-own-device (BYOD) environments, this can cause user frustration and a spike in help desk calls. The solution is to deploy an automated configuration process so users can easily connect their devices without invention from IT staff.
Implementing 802.1X authentication, which includes everything from setting up a RADIUS server to keeping end users connected, isn't easy.
Remote Authentication Dial-In User Service (RADIUS) servers are common in enterprise networks to offer centralized authentication, authorization and accounting (AAA) for access control. But RADIUS servers can also be useful in small and midsize networks to enable 802.1X authentication and WPA2 (802.11i) security for Wi-Fi nets.
Microsoft’s new metro-style Start screen is getting all the buzz, but for IT administrators there are many new network-related features and changes in both Windows 8 and Windows Server 2012 to be aware of.
Studying for and taking IT certification exams can be costly. These tips can help you find inexpensive study resources and ways to get hands-on experience with the technologies you're studying.
Implementing and supporting 802.1X authentication on your network can be a challenge, but here are some tools that can help.
Implementing and supporting 802.1X authentication on your network can be a challenge, but here are some tips that can help save you some time, money, and frustration.