So in Part 1 of this series on Airtight WIPS, we looked at how Airtight determines if an AP is rogue, or an “on-network rogue”
I ran into an interesting client behavior issues with several Apple Macbook Air Laptops today at work. I was able to solve the mystery, but
When it comes to security, I have a personal motto: Think maliciously, act responsibly. I really enjoy trying to manipulate clients, exploiting behavior and finding
So it’s time for Wireless Field Day 6, and I don’t think I finished a quarter of the blogs I wanted to write for WFD5.
The holy grail of network engineer is building a completely redundant network with no single point of failure, where outages are never seen by the
One of the things that I rarely see implemented in ACS 5.x are Identity Groups. This is an incredibly powerful tool that can be implemented