Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 14 Apr 2004 21:43:47 -0700
From:      "Ron Leedy" <rflii@speakeasy.net>
To:        <fscked@pacbell.net>, <freebsd-mobile@freebsd.org>, <owner-baylisa@baylisa.org>
Subject:   RE: Hams Report 85-mile 802.11b File Transfers @ Oregon
Message-ID:  <!~!UENERkVCMDkAAQACAAAAAAAAAAAAAAAAABgAAAAAAAAAtnwE%2BUCzpUCSmvzcHJH4jsKAAAAQAAAA3WTze/p6K06YX0ytFy4OWwEAAAAA@speakeasy.net>
In-Reply-To: <407D7323.50001@pacbell.net>

next in thread | previous in thread | raw e-mail | index | archive | help

The design I used to implement an 802.11g network at my company is that it
the access points connect to a DMZ zone.  The users who want to use it
access the DMZ and then using a VPN client may gain access to the corporate
network.  The VPN access is RAS based off the AD. Using AD policies, I can
limit (or not) users to the areas they need to access. This is a pain to the
casual consultant but the standard installation of our laptops include the
VPN client.

-Ron

> -----Original Message-----
> From: owner-baylisa@baylisa.org 
> [mailto:owner-baylisa@baylisa.org] On Behalf Of richard 
> childers / kg6hac
> Sent: Wednesday, April 14, 2004 10:22 AM
> To: freebsd-mobile@freebsd.org
> Subject: Hams Report 85-mile 802.11b File Transfers @ Oregon
s optimized for operation in the 2.4 gHz frequency.
> 
> People operating 802.11b networks in corporate environments, 
> take note - 
> your networks can probably be monitored from anywhere within a few 
> [dozen?] miles of the antenna, depending upon obstructions, 
> and perhaps 
> from over the horizon, as well.
> 
> Regards,
> 
> -- richard
> 

-- 
Outgoing mail is certified Virus Free.
Checked by AVG Anti-Virus (http://www.grisoft.com).
Version: 7.0.230 / Virus Database: 262.8.0 - Release Date: 4/9/2004
 



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?!~!UENERkVCMDkAAQACAAAAAAAAAAAAAAAAABgAAAAAAAAAtnwE%2BUCzpUCSmvzcHJH4jsKAAAAQAAAA3WTze/p6K06YX0ytFy4OWwEAAAAA>