<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Best security settings for Outdoor P2P with 1300 Bridges in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/best-security-settings-for-outdoor-p2p-with-1300-bridges/m-p/284145#M22746</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;From one standpoint, best security is achieved by powering the bridges off. You need to balance risk versus reward for any security decisions: How much security do you need, and how much work are you willing to put into it?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;WPA-PSK is a pretty good solution for non-Radius implementations. PEAP, or LEAP with long nonsense passwords, are pretty good solutions for sites with AAA services. Another option is point-to-point VPN terminating on routers adjacent to your bridges. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another option is not bothering with any security at all other than restricting your bridges from associating with anything besides each other. It just depends on what you need and how you want to get there.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 27 Jul 2004 14:42:49 GMT</pubDate>
    <dc:creator>gamccall</dc:creator>
    <dc:date>2004-07-27T14:42:49Z</dc:date>
    <item>
      <title>Best security settings for Outdoor P2P with 1300 Bridges</title>
      <link>https://community.cisco.com/t5/wireless/best-security-settings-for-outdoor-p2p-with-1300-bridges/m-p/284144#M22745</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;I would like to hear from you otu there what are the best security setting for a P2P bridge outdoor link with two 1310 bridges. (with/without external Radius).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;any input is very welcome&lt;/P&gt;&lt;P&gt;Oliver&lt;/P&gt;</description>
      <pubDate>Sun, 04 Jul 2021 16:50:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/best-security-settings-for-outdoor-p2p-with-1300-bridges/m-p/284144#M22745</guid>
      <dc:creator>o-ziltener</dc:creator>
      <dc:date>2021-07-04T16:50:18Z</dc:date>
    </item>
    <item>
      <title>Re: Best security settings for Outdoor P2P with 1300 Bridges</title>
      <link>https://community.cisco.com/t5/wireless/best-security-settings-for-outdoor-p2p-with-1300-bridges/m-p/284145#M22746</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;From one standpoint, best security is achieved by powering the bridges off. You need to balance risk versus reward for any security decisions: How much security do you need, and how much work are you willing to put into it?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;WPA-PSK is a pretty good solution for non-Radius implementations. PEAP, or LEAP with long nonsense passwords, are pretty good solutions for sites with AAA services. Another option is point-to-point VPN terminating on routers adjacent to your bridges. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another option is not bothering with any security at all other than restricting your bridges from associating with anything besides each other. It just depends on what you need and how you want to get there.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Jul 2004 14:42:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/best-security-settings-for-outdoor-p2p-with-1300-bridges/m-p/284145#M22746</guid>
      <dc:creator>gamccall</dc:creator>
      <dc:date>2004-07-27T14:42:49Z</dc:date>
    </item>
  </channel>
</rss>

