You might want to do some reading about WPA and 802.1x protocols. The idea is that a host trying to connect to wired or wireless network needs to authenticate in order to enable the port it is connecting to (we are talking here about layer 2 authentication). The approach gives you a wide choice of authentication methods like EAP-TLS, PEAP, smart cards, certificates, etc...
The open source implementation of 802.1x can be found here: http://www.open1x.org/ Just my 2 cents... Guy On Wed, 2005-01-05 at 11:17 +0200, Shachar Shemesh wrote: > Geoffrey S. Mendelson wrote: > > >Always use WEP (encryption) 64 bit is good enough. It is NOT to > >keep your data secure, don't ever assume that it will be, > >but to keep people from using your network to send spam or > >"share" kidde porn. > > > Actually, I was seriously considering not using it. The idea is that, > since WEP is so weak, I might as well do without altogether. Any host > wishing to do anything at all on my network, including browsing the > internet, will need to have openvpn installed and configured. Once > that's the case, there is no extra benefit from using WEP. > > Shachar > ================================================================= To unsubscribe, send mail to [EMAIL PROTECTED] with the word "unsubscribe" in the message body, e.g., run the command echo unsubscribe | mail [EMAIL PROTECTED]
