Client Case Study: Enterprise network security Global enterprises could lose millions of dollars in minutes without ironclad network security. Learn how industry leaders—including Goldman Sachs, Siemens, and a national US bank—protect critical dat... Network Security Best Practices
The unique challenges of campus networks By Terry Burton, Director of Security Table of contents What is a campus area network? 7characteristics of campus networks Universities function as their own ISPs Massive user community with constant ... Network Security Best Practices Network Security Protocols
Importing the root CA The final step to configuring EAP for FreeRADIUS is to add the CA (Certificate Authority) to every client machine tha t performs EAP authentication. Before proceeding with this step, make sure that yo... Network Security Best Practices
Don’t "set it and forget it" So you decided that whatever you were using for network security wasn’t getting the job done… either it didn’t scale with the growth in your user base, devices, or network design, or it was hindering ... Network Security Best Practices
RADIUS server installation: Expert solutions for enhanced network security Professional RADIUS server installation services RADIUS server installation is more involved than just setting up a few software packages. The default RADIUS products are intended to be the basis for ... Network Security Best Practices Network Security Protocols
WiFi spoofing for fun and profit You can spend as much time as you want securing your RADIUS server infrastructure and the rest of your network. But are you really secureagainst WiFi spoofing attacks? In this article, we show just ho... Network Security Best Practices Security Threats and Vulnerabilities
Configuring FreeRADIUS authentication with PAP (Password Authentication Protocol) Introduction to PAP authentication Password Authentication Protocol (PAP) is one of the most fundamental authentication methods used in Remote Authentication Dial-In User Service (RADIUS). Despite bei... Network Security Best Practices Network Security Protocols
Configuring EAP for FreeRADIUS Once FreeRADIUS has been configured to use PAP , it is straightforward to configure the server to use EAP for authentication. This article will walk through all the necessary steps. Step 1: Install Op... Network Security Best Practices
RADIUS design for internet service providers (ISPs) More than almost any other business, internet service providers (ISPs) need to provide their customers with fast, reliable internet connection to their computer network. Any downtime can be catastroph... Network Security Best Practices
Authorized users only: Why use RADIUS and 802.1x to control network access? RADIUS can be an alternative to implementing 802.1x for network access control in complex enterprise environments. Controlling which users and what devices are on your network has become significantly... Network Security Best Practices
Is PAP secure? A common misconception is that PAP is less secure than other authentication protocols such as CHAP, MS-CHAP, or EAP-MSCHAP(v2). This perception arises because of a misunderstanding of how PAP is actua... Network Security Best Practices Network Security Protocols
802.1X FreeRADIUS setup Undertaking 802.1X setup is a daunting experience for many organizations. There are detailed requirements on end-user PCs, switches, servers, certificates, and more. If any of these requirements are n... Network Security Best Practices