Recommend security method for CB21AG clients

I am looking for recommendations of the strongest/most secure encryption and authenication method to use to secure clients that are using CB21AG client adapters and ADU software.
EAP-TLS is not an option as we currently do not have PKI in place. EAP-FAST is preferred, but not supported yet with curent client software. What's the next best method?
I have a WLSE and ACS server along with AP1210s at my disposal. Client laptops are predominantly XPsp1.
Thanks, in advance, for your suggestions.
John Rumball
[email protected]

The problem with LEAP (besides the vulnerability with passwords) is that it requires Cisco's version of TKIP and MIC to be secure. The CB21 doesn't appear to support them. If it doesn't I would strongly recommend against "raw" WEP (which is what you are left with when you turn off Cisco's TKIP and MIC). Use WPA PEAP.

Similar Messages

  • What is the recommended security software for a Mac?

    what is the recommended security software for a Mac

    My standard spiel on malware:
    At this time there have been no confirmed Mac OS X viruses (subject to the semantic debate about whether the old iChat exploit, now long since blocked, was properly classified as a virus or a trojan horse, and not counting the Word macro virus that can affect Office v.X or non-updated copies of Office 2004), very few trojans and no adware or spyware. I therefore do not feel that antivirus or antispyware software is necessary at this time as long as users are careful about what they download from the Internet or accept as attachments via email.
    The most common exploit is a recent outbreak of "scareware" that people are encountering while web surfing. This "scareware" pops up and claims that your system is infected with viruses, prompts you to download their "scanner", then tells you that you need to purchase their paid software to remove them. These fake applications, appearing by many names including Mac Defender, Apple Security Center, Apple Web Security, and many others, do nothing at all other than turn off the fake warnings once they have your money. DO NOT fall for these.
    Security precautions for Mac OS X mostly are common sense: don't download and run files from sites you don't know, don't fall for any "you have viruses" messages, don't double-click on attachments in emails you aren't expecting and/or from people you don't know, and make sure you password your system with a non-trivial password and keep that password secure. In addition, don't leave your system available in a public place and unattended where someone unauthorized could use it and potentially install malware (such a policy is also a precaution against theft).
    It is possible for a Mac user to inadvertently forward a Windows virus to a PC user though you'd have to do it manually so the above precautions would probably prevent such virus-spreading, and said Windows virus cannot infect the Mac.
    If you do decide you wish to run antivirus software, I think that the donationware clamXav should be more than enough. iAntivirus has also been recommended by others, though I have no personal experience with it.
    If you are running Windows on your system, either via BootCamp, Parallels Workstation or another solution, then that copy of Windows is subject to all the myriad exploits common to the Windows world, so you need to take full precautions, including running both antivirus and antispyware software.
    Regards.

  • What is the recommended security software for MacPro? I am getting popups, including offer to sell Mac Sheild. Is this legit?

    What is the recommended security software for MacPro? I am getting popups, including offer to sell Mac Sheild. Is this legit?

    No, it is not legit, it's a scam. Avoid such popups and DO NOT under any circumstances fall for any claims that your system has been infected by viruses and download any of this "scareware". See:
    http://support.apple.com/kb/HT4650
    For additional information, see also:
    http://www.reedcorner.net/news.php/?p=138  
    http://www.reedcorner.net/guides/macvirus/  
    If you do a forum search on Mac Defender, Mac Protector or Apple Security Center (this fake has a lot of different names) you will also find a lot of threads about this.
    The most recommended "security software" is "none", beyond common sense and normal caution. If you do, however, decide you wish to run antivirus software, I think that the donationware clamXav should be more than enough provided you remember to scan your system from time to time. iAntivirus has also been recommended by others, though I have no personal experience with it.
    If you are running Windows on your system, either via BootCamp, Parallels Workstation or another solution, then that copy of Windows is subject to all the myriad exploits common to the Windows world, so you need to take full precautions, including running both antivirus and antispyware software.
    Regards.

  • Hardware recommendations and advice for 100 client network

    Hi
    We are currently looking at setting up a very basic separate wireless network for a client in two adjacent large cabins (3m apart) that will support up to 100 clients max concurrently. This will be solely for contractors to access basic internet, connections to web mail etc. There will be no existing infrastructure to connect to, so we will be looking at an internet connection of some form, a small switch and the wireless network. Range isn't an issue as they are next to each other its the support for such a large amount of connections. I thought a clustered setup of 2-4 WAP321 might be a bit stretched and we might get issues as the number of simultaneous connections gets near 100. I was also looking at a couple of standalone Aironet 1600s, one in each cabin.
    The network itself is very basic, as it is literally just shared internet access but I need to ensure that it's reliable with 100 clients connected.
    I did ring presales tech but they weren't mcuh help and sounded like they knew less than me, so any help would be appreciated.
    Regards
    Harry

    Dear Harry,
    Thank you for reaching Small Business Support Community.
    By checking on the WAP321 datasheet I see:
    - Recommended user support = Up to 32 connective users, 20 active users
    - Active clients per cluster = 80
    I agree with you when say "might be a bit stretched and we might get issues as the number of simultaneous connections gets near 100", therefore I suggest you to go for an enterprise-class, entry-level device like the Aironet1600 you mention.  I would anyway suggest you to contact back the presales team or the Wireless-Mobility Support Community for further assistance and advice.
    Thank you for your time on this matter and please let me know if there is anything I may assist you with in the meantime.
    Kind regards,
    Jeffrey Rodriguez S. .:|:.:|:.
    Cisco Customer Support Engineer
    *Please rate the Post so other will know when an answer has been found.

  • Recommended Security Suite for Firefox 25. Using Mcafee Security Center ver 12.8, wondering if I should change to Bitdefender or Kaspersky? Any suggestion

    Have 2 Win 8 machines, running Firefox 25 and one lap top with Win 7. All three are using Mcafee Security Suite ver 12.8 with Anti Virus 16.8. The subscription runs out in February 2014. I would like to make a change and am concerned about compatibility issues using Firefox ver 25. Are there any compatibility issues with Bitdefender Windows 8 Security? Are there any compatibility issues with Kaspersky Internet Security 2013 or Pure 3.0 Total Security? If I do make a change on the Security Suites, I will be using the same version on the Win 8 and the Win 7 machines. All three will be using Firefox 25. Any suggestions would be greatly appreciated.

    Firefox doesn't have any known compatibility issues with any of the major anti-virus suites, but honestly you are wasting your money if you pay for them. Uninstall them and use Window 8's built in Windows Defender. Update your Windows 8 machines to Windows 8.1, and make sure your win 7 machine is up to date, and always keep everything on your machines (Firefox, plugins, etc.) all up to date. That will keep you secure as possible.

  • Best method for keeping clients updated

    I have five seats for Creative Cloud, therefore five workstations that need updates installed on a regular basis.
    In common with most corporates (I imagine) we don't allow end-users to have Admin access, so IT have to do this for them.
    It can take quite some time - up to a couple of hours per workstation if it's been neglected for a month or two.
    IT don't have the time for this, and the end-users can't spare their machines for it.
    I can't believe there isn't some automated method that does not require the user to have Admin rights.
    What's the right way to be doing this?
    Thanks in advance.

    Update - I discovered the Packager and the Remote Update Manager.
    Job done.

  • Selecting the Security method for a landscape of SAP BW & BOE & SAP EP

    Hi,
    I am BW Consultant with BOE experience.
    But i could not use the Landscape such as SAP BW as Warehouse Solution, BOBJ(WebI, Crystal, Xcelsius) as reporting tool and SAP EP as frontend Portal to view all reports.
    Now i am in a project where i am using Landscape mentioned above.
    Now the question is in this scenario, what is the best practice for security and SSO implementation.
    We have installed the SAP BW and BOE. Also BOBJ Integration kit. Now After installing the BOBJ Integration kit, as a post installation & Configuration step we need to import SAP Users and Roles in CMC for 'SAP Authenticaion'. But at this moment we have not decided any approach about the security.
    If i mport SAP Users and Roles in to CMC of BOE, is it possible to use AD/LDAP appraoch in the later stage?
    Please suggest me best approach to implement the Security and SSO.
    Thanks in Advance
    Bala.

    Hey Bala,
    Log-in to CMC: (as Admin)
    Go to:
    Authentication
    here you can see : Enterprise, AD, NT , LDAP & SAP.
    Map the Users based on their environment. After doing this, you can see how they are differed.
    One more just to update you.
    When you opt for SAP authentication, in Authentication @ CMC.
    You can see Roles tab, there Check Automatically Import Users and Force User Synchronization.
    Automatically import users - This checkbox allows you to enable the import of SAP users that are assigned to the roles that have been imported for the SAP entitlement system.
    Force User Syncronisation: If you enable this option, each update in the Role import tab will also result in a syncronisation of the assigned SAP users with the corresponding user accounts on you SAP BOE system.
    Check OSS note for scheduling this.
    https://websmp102.sap-ag.de/~form/handler?_APP=01100107900000000342&_EVENT=REDIR&_NNUM=1406037&_NLANG=E
    Hope it helps you a lot.
    Thank You!!
    Sent from iPhone

  • What are some recommended security softwares for Macs?

    I've been getting security alerts about possible hacking and would like some suggestions to secure my network.

    Sharineedshelpfast wrote:
    I've been getting security alerts about possible hacking and would like some suggestions to secure my network.
    There is none and one is not needed. Security is built into OS X.
    For more  info:  http://www.thesafemac.com/mmg/
    Best.

  • Recommended distortion method for matching two images

    I have two images of North America as separate layers that I'm trying to line up as closely as possible. One is a color image of the earth's surface while the other is a grayscale image representing the topography of the terrain. There are many obvious visual features in the images to use for matching, but I'm not sure what is the best tool or workflow for distorting, scaling, skewing, etc. I have previously been using "Warp," but while I can line up certain areas easily, other areas appear quite difficult to line up. I'm wishing there was a way to define "features" that I want matched up and then let Photoshop do an automated process, but I think that may be asking a little much. Because the images may have been taken from different angles, it's not just a simple non-proportional scale problem. Some areas need to be squished while other areas need to be stretched. Any suggestions?

    If the two maps are from different sources or different times, or have been created using different map projections, or if the two maps have different levels of accuracy, you may not be able to get a perfect match-up.
    Neil

  • Can anyone recommend a method for File Replication among MacBookPros and Server?

    I am trying to find a way to have folders replicated on a Shared Lion-Server Folder.  The idea is - A folder is shared on the Server and when anyone changes the folders or files within the Share, that those changes are replicated to folder/Files on the independant folders of users.  So, when "John" is on a plane and he updates a Pages Document those changes are updated and replicated on the Shared Folder on the Server - Once "John" regains internet access.  Similar to Dropbox, but without the limitations of Size.
    Any suggestions?  Sorry if my explination is not very clear.
    Sal

    I'll chime in here and say that managing Mobility with Profile Manager is broken right now. It will work about one out of every 5 machines that you deploy the profile to.
    I was told by an Apple engineer to continue using Workgroup Manager for setting up users with Mobile accounts and Portable Home Directories. This always works as expected.
    Currently Mobility is the only thing I'm using MCX to manage. Everything else works fine with Profile Manager.

  • What is the most secure password transfer method for POP3 supported by Thunderbird?

    I will receive eMail from a POP3-Server that support encrypted transfer of passwords with the SASL-Methods "SCRAM-SHA-1" and "SCRAM-SHA-256" (successful tested with the command line tool 'mpop') but Thunderbird say that the Server does not support encrypted transfer of Passwords. I think in real Thunderbird does not support the strong Methods offered by the POP3-Server.
    What is the most secure method for Password transfer on POP3 that is supported by Thunderbird?
    Greetings Erik

    I do not see SASL listed, do you?

  • What is the replacement method for preventDefault() on iOS?

    Using preventDefault() in response to orientationChanging is a well-documented technique for preventing rotation on iOS. What is the recommended replacement method for this call when manually managing device rotation events?
    From the release notes: preventDefault() is not honored for the ORIENTATION_CHANGING event on iOS. This is a behavior change from AIR 3.4 and will remain so. (3324338)

    Auto-orientation has drastically changed in iOS 6. Some of the auto-orientation callbacks have been completely deprecated in iOS 6. This change affects the screen orientation API's in AIR too and support for the new callbacks have been added in AIR 3.5 beta release. The deprecated callbacks informed the application about the new orientation it was being rotated to. Hence, application could decide whether it wanted to rotate to the new orientation or not. However, the new callbacks do not give us such information. The application is only queried about what orientations are currently supported. If this value returned by the new callbacks matches the new orientation stage is being rotated to, the stage automatically rotates. Otherwise it does not. As a result of this limitation of the new callbacks, support from preventDefault() was deprecated on iOS in AIR 3.5(built with iOS 6 SDK). The application will still receive the ORIENTATION_CHANGING event. But calling preventDefault() inside the ORIENTATION_CHANGING event handler won't prevent the stage from being rotated to the new orientation. It is important to note that apps packaged with iOS 6 and running on iOS 5.1 devices or lower will also see this behavior change of not able to control auto orientation by using preventDefault(). This was done to make this change consistent across iOS devices.

  • Security Assessment for CRM

    Hi,
    We have been asked to do a security assessment for a client for SAP CRM.
    Any pointers to this ?
    Can anyone share any basic information on the following :
    1. Basic Functionalities in SAP CRM
    2. Structure of roles / authorisations for CRM?

    crm does not give the rights through to sharepoint. u have the option to open sharepoint external with list component where you must take away the sharepoint rights and for us never a usefull option. We created custom application internal and did not published
    sharepoint, we programmed so that documents are visible in iframe via a IIS website and looks to the logged-in user´s and only the documents are visible which belongs to his security role. its a lot of work but we found that it is also faster then the list
    component.
    gruss Daniel Ovadia MBSS - Microsoft Dynamics CRM MCNPS

  • Seeking recommendations for handling large binary documents with security(preferable) for inbound and outbound scenarios from OSB- SOA and SOA- OSB

    Hi,
    I am currently working on a project with the following requirements
    1. Client transfers binary document (between 1-20MB in size) from OSB proxy to SOA composite to Content Management system
    2. Client retrieves binary document (between 1-20MB in size) from Content Management system to SOA composite to OSB proxy
    In otherwords, a inbound and outbound integration.
    What I have tried so far and my results:
    Scenario A
    1. Enabled MTOM on SOA composite by attaching wsmtom policy
    2. Created an OSB business service and consumed the SOA composite application
    3. Enabled MTOM on OSB proxy and business service and configured it to pass by reference
    Scenario B
    1. Enabled MTOM and security on SOA composite by attaching wsmtom policy and SAML policy
    2. Created an OSB business service and consumed the SOA composite application
    3. Enabled MTOM on OSB proxy and business service and configured it to pass by reference
    I have a demo integration setup that writes a binary document to a file using the above steps. My SOA composite has a file adapter that writes the binary data to an external file and it is exposed as a web service with a simple WSDL definition that has an inline XSD schema with an single element of base64binary type. I have added a mediator that maps this base64binary element node to the file adapter's input node.
    Result for Scenario A with file size less than 1 MB:
    Flawless execution with sub-second response times
    Result for Scenario A with file size of 8MB
    First attempt: SOA composite faults with database transaction related error, solved by increasing JTA timeout
    Second attempt: Flawless execution, but file transfer took over 100 seconds to complete. This is very poor performance and my suspicions are that this cannot be the expected behaviour, but I dont know the internal workings of the SOA composite and why its taking this long.
    Result for Scenario B:
    The OSB business service does not accept/recognize the SAML policy in the WSDL and suggests to configure OWSM policies manually, but OWSM policy in OSB does not have the wsmtom policy. Regardless of this, any permutation of MTOM + WSS security in this integration scenario either did not work outright or MTOM optimization was not happening ie binary data was materalizing in the message body.
    I have only about 3 weeks left to implement a viable solution and the closest ive come to a solution is Scenario A but that +100 second response time for an 8MB file is really worrying.
    I would appreciate any level of guidance, recommendations or suggestions as to how I go about tackling this problem.
    Thanks
    regards,
    Johnny

    I think this is due to the underlying mechanism of weblogic classloading..
    You can contact oracle support @ https://support.oracle.com to report issues. Roughly this is the process .
    1- get the Oracle Customer Support Identifier (CSI) for the client you are working for.
    2- Create a user profile quoting the CSI. This will send an approval request to oracle support admins at your client.
    3- Get the oracle support admins at your client site to approve your request for support access.
    4-Once they approve , you can access the support site and raise service requests.

  • Subsite security trimming in the Office365 for Android client

    I just installed the Android Office365 client and noticed that subsite links are not security trimmed. Is this by design or can I influence this by settings in Sharepoint Online? If I click a subsite link I don't have permissions to I get the error "Can't
    complete task. Office Mobile encountered a problem."
    Just noticed this behaviour only applies if you're member at a site, then you'll see the links to all subsites in the Android client, even those you don't have permissions to. In the web interface those links are trimmed. If you only have visitor rights
    at the suprasite you only see the subsite links you have permissions for in the Android client.

    Hi,
    According to your post, my understanding is that you failed to click a subsite link in the Office365 for Android client.
    I rececomend to set a user as administrator and then sign in the site using the account to check whether it works.
    This forum is supproted for SharePoint On-Primse. Regarding SharePoint Online, for quick and accurate answers to your questions, it is recommended that you initial a new thread in Office 365 forum.
    Office 365 forum
    http://community.office365.com/en-us/forums/default.aspx
    Thanks,
    Linda Li                
    Forum Support
    Please remember to mark the replies as answers if they help and unmark them if they provide no help. If you have feedback for TechNet Subscriber Support, contact
    [email protected]
    Linda Li
    TechNet Community Support

Maybe you are looking for

  • Printing 52 characters in xml punblisher report

    Hi We have requirment for payroll reports, that we will have to print concatined 11 segments(Total 52 characters) of cost centre in Excel using XML publisher. But the problem is whem I am prining this it is comming but has two line with a single cell

  • FCP to PP Blackmagic frame rate settings question

    Hello everyone. FCP to PP editor here, and as I attempt to monitor my AVC-Intra 100 1080HD 23.976 footage on an external monitor via my Blackmagic Studio card, I seem to be missing a setting that was available in FCP 7. I'm hoping someone can help me

  • What exit is available to change EKPO-EVERS

    Hi What exit is available to change Purchase order line item field Shipping instr(Delivery tab) [EKPO-EVERS] before PO save? Thanks Rama

  • IBooks older look (3) in iOS8?

    I Think I know the answer to this- but thought I'd see if anyone has found a solution. i use my iPad to read a lot. I really like the 'look' it has in the older iBooks- where you could select the Book Theme and it would look like a real book. Not jus

  • Adf image cache directory

    Hi, I am using oracle ADF EA 14. I realized that when deploying my application, it created a cache directory under my adf/image directory. What is the cache directory for? Because sometimes the cache directory is not created and the page does not hav