<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Security for bridge connectivity in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/security-for-bridge-connectivity/m-p/426345#M22673</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;i would suggest that you use any RADIUS server like ACS to secure your Wireless bridged network. For information on how to configure the RADIUS server read &lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/wireless/ps4570/products_configuration_example09186a00801bd035.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/wireless/ps4570/products_configuration_example09186a00801bd035.shtml&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 16 Jan 2006 19:56:08 GMT</pubDate>
    <dc:creator>smahbub</dc:creator>
    <dc:date>2006-01-16T19:56:08Z</dc:date>
    <item>
      <title>Security for bridge connectivity</title>
      <link>https://community.cisco.com/t5/wireless/security-for-bridge-connectivity/m-p/426344#M22672</link>
      <description>&lt;P&gt;I need pointers on how to implement proper secure bridge (point to multipoint or point-to-point) Can I use radius/tacacs to authenticate non-root bridges using their mac-address ? &lt;/P&gt;</description>
      <pubDate>Sun, 04 Jul 2021 18:29:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/security-for-bridge-connectivity/m-p/426344#M22672</guid>
      <dc:creator>utawakevou</dc:creator>
      <dc:date>2021-07-04T18:29:21Z</dc:date>
    </item>
    <item>
      <title>Re: Security for bridge connectivity</title>
      <link>https://community.cisco.com/t5/wireless/security-for-bridge-connectivity/m-p/426345#M22673</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;i would suggest that you use any RADIUS server like ACS to secure your Wireless bridged network. For information on how to configure the RADIUS server read &lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/wireless/ps4570/products_configuration_example09186a00801bd035.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/wireless/ps4570/products_configuration_example09186a00801bd035.shtml&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Jan 2006 19:56:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/security-for-bridge-connectivity/m-p/426345#M22673</guid>
      <dc:creator>smahbub</dc:creator>
      <dc:date>2006-01-16T19:56:08Z</dc:date>
    </item>
    <item>
      <title>Re: Security for bridge connectivity</title>
      <link>https://community.cisco.com/t5/wireless/security-for-bridge-connectivity/m-p/426346#M22674</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes you can.  Under the SSID configuration you can specify an authentication username and password.  This can be an added level of security on top of MAC authentication.  You can also restrict those user/mac accounts to be the only ones that can authenticate to your infrastructure SSID. A lot of layers.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 22 Jan 2006 04:04:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/security-for-bridge-connectivity/m-p/426346#M22674</guid>
      <dc:creator>dcavanaugh</dc:creator>
      <dc:date>2006-01-22T04:04:06Z</dc:date>
    </item>
  </channel>
</rss>

