let me know if you have any further questions. if need be i can connect with
you guys with the right people.


/vicky

-----Original Message-----
From: lawrence sculark [mailto:lawz4u@;hotmail.com]
Sent: Saturday, November 09, 2002 9:07 PM
To: [EMAIL PROTECTED]
Subject: RE: WLAN security matters [7:57160]


vicki shar the info with all of us..please







LAWRENCE A SCULARK
>From: "Vicky O. Mair"
>Reply-To: "Vicky O. Mair"
>To: [EMAIL PROTECTED]
>Subject: RE: WLAN security matters [7:57160]
>Date: Sun, 10 Nov 2002 00:57:25 GMT
>Received: from mc5-f32.law1.hotmail.com ([65.54.252.39]) by
mc5-s15.law1.hotmail.com with Microsoft SMTPSVC(5.0.2195.5600); Sat, 9 Nov
2002 17:12:59 -0800
>Received: from groupstudy.com ([66.220.63.9]) by mc5-f32.law1.hotmail.com
with Microsoft SMTPSVC(5.0.2195.5600); Sat, 9 Nov 2002 17:12:59 -0800
>Received: from localhost (mail@localhost)by groupstudy.com (8.9.3/8.9.3)
with SMTP id BAA12501;Sun, 10 Nov 2002 01:12:58 GMT
>Received: by groupstudy.com (bulk_mailer v1.13); Sun, 10 Nov 2002 00:57:26
+0000
>Received: (from listserver@localhost)by groupstudy.com (8.9.3/8.9.3) id
AAA10846GroupStudy Mailer; Sun, 10 Nov 2002 00:57:26 GMT
>Received: (from mail@localhost)by groupstudy.com (8.9.3/8.9.3) id
AAA10842GroupStudy Mailer; Sun, 10 Nov 2002 00:57:25 GMT
>Message-Id: 
>X-GroupStudy-Version: 3.1.1a
>X-GroupStudy: Network Technical
>Sender: [EMAIL PROTECTED]
>Precedence: bulk
>Return-Path: [EMAIL PROTECTED]
>X-OriginalArrivalTime: 10 Nov 2002 01:12:59.0288 (UTC)
FILETIME=[4EF29180:01C28856]
>
>hi there,
>
>ping me offline and i can direct you to folks who have a (hw) solution
which
>not only secures wlans but also does a good job protecting your overall
>backbone security.
>
>/vicky
>
>-----Original Message-----
>From: [EMAIL PROTECTED] [mailto:nobody@;groupstudy.com]On Behalf Of
>Carlos Fragoso Mariscal
>Sent: Saturday, November 09, 2002 9:19 AM
>To: [EMAIL PROTECTED]
>Subject: WLAN security matters [7:57160]
>
>
>Hello,
>
>I'm doing a research for the deployment of a secure implementation
>of a wireless 802.11a/b environment.
>
>Until WPA (Wireless Protected Access) from the WiFi alliance comes
>to life next year, I realised that WEP is the only air-side Layer 2
>(crackeable) encryption protocol. This lack of security requires
>other upper-layer protocols to do this job such as IPSec or VPN
>implementations. Those solutions seem to be not very scalable indeed.
>
>I would like to know which kind of implementations are the most
>preferred and desirable for you. Is there anyone managing any
>secure deployment similar?
>I have heard a little bit about Cisco vendor implementation (LEAP)
>but I suppose it only works with both APs and client cards from Cisco.
>
>Authentication is a first step, 802.1x could help us to authenticate
>users and establish a secure VLAN-based traffic, but it is not a
>solution for air-side sniffing and spoofing. Is IPSec or VPN the
>only solution?
>
>If anyone has any documentation or slides about LEAP, 802.1x either
>wireless secure deployments, they will be appreciated.
>
>Thank you,
>
>-- Carlos
Add photos to your messages with MSN 8. Get 2 months FREE*.




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=57179&t=57160
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to