CWSP-SOHO 802.11 Security
Here is my notes on Chapter 6 – SOHO 802.11 Security of CWSP Official Study Guide. * WPA/WPA2-Personal is the …
Here is my notes on Chapter 6 – SOHO 802.11 Security of CWSP Official Study Guide. * WPA/WPA2-Personal is the …
In this post I am going to describe the way I am studying for CWSP (Certified Wireless Security Professional) certification. …
Here is my notes about Chapter 3 (Encryption Ciphers & Methods) of CWSP Study Guide. Symmetric & Asymmetric Algorithms In …
IEEE 802.11k-2008 defines Radio Resource Management (RRM) mechanism that enable 802.11k capable client’s radio to better understand the RF environment …
PMK Caching & Preauthentication are two different methods defined in IEEE 802.11-2007 to allow fast secure roaming. PMK Caching: In …
In this post we will see how “Over-the-DS Fast BSS Transition” works. We will use the same topology as shown …
In this post we will see how 802.11r Over-the-Air Fast BSS Transition works. We will use same topology & base …
In this post we will see how 802.11r supported client first associate to an SSID configured for 802.11r FT support. …
IEEE 802.11r-2008 is also known as “fast basic service set transition –FT” is defined for allow fast secure roaming.802.11r mechanism …
In this post we will see how a basic 802.11 roam works using Cisco WLC & two APs. My WLC …
My CCIE Wireless Journey & More.....
CCNP to CCIE level wireless tricks & training
Not Another Wireless Blog
Path to CCIE
My CCIE Wireless Journey & More.....
My CCIE Wireless Journey & More.....
My CCIE Wireless Journey & More.....
My CCIE Wireless Journey & More.....
My CCIE Wireless Journey & More.....