Don’t "set it and forget it" So you decided that whatever you were using for network security wasn’t getting the job done… either it didn’t scale with the growth in your user base, devices, or network design, or it was hindering ... Network Security Best Practices
WiFi spoofing for fun and profit You can spend as much time as you want securing your RADIUS server infrastructure and the rest of your network. But are you really secureagainst WiFi spoofing attacks? In this article, we show just ho... Network Security Best Practices Security Threats and Vulnerabilities
Creating server certificates for FreeRADIUS Once the initial EAP testing has been performed, it's time to create the production-grade server certificates for your FreeRADIUS environment. These certificates form the foundation of secure communic... Network Security Best Practices
Configuring EAP for FreeRADIUS Once FreeRADIUS has been configured to use PAP , it is straightforward to configure the server to use EAP for authentication. This article will walk through all the necessary steps. Step 1: Install Op... Network Security Best Practices
Common EAP configuration problems and how to fix them If you have followed the steps for configuring EAP and are encountering problems, there are only a few things that go wrong. This article goes through the most common issues and how to fix them. Serve... Network Security Best Practices
Making RADIUS More Secure As we’ve previously discussed, there are several insecure elements in RADIUS. We are currently working in the IETF (Internet Engineering Task Force) to close those gaps and improve security for everyo... Network Security Protocols