If a rogue access point existed and a user walks within range of both a legitimate and rogue AP while authenticating - could the EAP packets be distributed between the two systems possibly resulting in:
EAP Response type 25, but no expected type known on the legitimate server? --- Roberto Ullfig - [email protected] Systems Administrator Enterprise Architecture and Development | ACCC University of Illinois - Chicago
_______________________________________________ radiator mailing list [email protected] https://lists.open.com.au/mailman/listinfo/radiator
