Date: Wed, 14 Apr 2004 21:43:47 -0700 From: "Ron Leedy" <rflii@speakeasy.net> To: <fscked@pacbell.net>, <freebsd-mobile@freebsd.org>, <owner-baylisa@baylisa.org> Subject: RE: Hams Report 85-mile 802.11b File Transfers @ Oregon Message-ID: <!~!UENERkVCMDkAAQACAAAAAAAAAAAAAAAAABgAAAAAAAAAtnwE%2BUCzpUCSmvzcHJH4jsKAAAAQAAAA3WTze/p6K06YX0ytFy4OWwEAAAAA@speakeasy.net> In-Reply-To: <407D7323.50001@pacbell.net>
next in thread | previous in thread | raw e-mail | index | archive | help
The design I used to implement an 802.11g network at my company is that it the access points connect to a DMZ zone. The users who want to use it access the DMZ and then using a VPN client may gain access to the corporate network. The VPN access is RAS based off the AD. Using AD policies, I can limit (or not) users to the areas they need to access. This is a pain to the casual consultant but the standard installation of our laptops include the VPN client. -Ron > -----Original Message----- > From: owner-baylisa@baylisa.org > [mailto:owner-baylisa@baylisa.org] On Behalf Of richard > childers / kg6hac > Sent: Wednesday, April 14, 2004 10:22 AM > To: freebsd-mobile@freebsd.org > Subject: Hams Report 85-mile 802.11b File Transfers @ Oregon s optimized for operation in the 2.4 gHz frequency. > > People operating 802.11b networks in corporate environments, > take note - > your networks can probably be monitored from anywhere within a few > [dozen?] miles of the antenna, depending upon obstructions, > and perhaps > from over the horizon, as well. > > Regards, > > -- richard > -- Outgoing mail is certified Virus Free. Checked by AVG Anti-Virus (http://www.grisoft.com). Version: 7.0.230 / Virus Database: 262.8.0 - Release Date: 4/9/2004
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?!~!UENERkVCMDkAAQACAAAAAAAAAAAAAAAAABgAAAAAAAAAtnwE%2BUCzpUCSmvzcHJH4jsKAAAAQAAAA3WTze/p6K06YX0ytFy4OWwEAAAAA>
