Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 14 Apr 2004 21:43:47 -0700
From:      "Ron Leedy" <rflii@speakeasy.net>
To:        <fscked@pacbell.net>, <freebsd-mobile@freebsd.org>, <owner-baylisa@baylisa.org>
Subject:   RE: Hams Report 85-mile 802.11b File Transfers @ Oregon
Message-ID:  <!~!UENERkVCMDkAAQACAAAAAAAAAAAAAAAAABgAAAAAAAAAtnwE+UCzpUCSmvzcHJH4jsKAAAAQAAAA3WTze/p6K06YX0ytFy4OWwEAAAAA@speakeasy.net>
In-Reply-To: <407D7323.50001@pacbell.net>

Next in thread | Previous in thread | Raw E-Mail | Index | Archive | Help
The design I used to implement an 802.11g network at my company is that =
it
the access points connect to a DMZ zone.  The users who want to use it
access the DMZ and then using a VPN client may gain access to the =
corporate
network.  The VPN access is RAS based off the AD. Using AD policies, I =
can
limit (or not) users to the areas they need to access. This is a pain to =
the
casual consultant but the standard installation of our laptops include =
the
VPN client.

-Ron

> -----Original Message-----
> From: owner-baylisa@baylisa.org=20
> [mailto:owner-baylisa@baylisa.org] On Behalf Of richard=20
> childers / kg6hac
> Sent: Wednesday, April 14, 2004 10:22 AM
> To: freebsd-mobile@freebsd.org
> Subject: Hams Report 85-mile 802.11b File Transfers @ Oregon
s optimized for operation in the 2.4 gHz frequency.
>=20
> People operating 802.11b networks in corporate environments,=20
> take note -=20
> your networks can probably be monitored from anywhere within a few=20
> [dozen?] miles of the antenna, depending upon obstructions,=20
> and perhaps=20
> from over the horizon, as well.
>=20
> Regards,
>=20
> -- richard
>=20

--=20
Outgoing mail is certified Virus Free.
Checked by AVG Anti-Virus (http://www.grisoft.com).
Version: 7.0.230 / Virus Database: 262.8.0 - Release Date: 4/9/2004
=20



Want to link to this message? Use this URL: <http://docs.FreeBSD.org/cgi/mid.cgi?!~!UENERkVCMDkAAQACAAAAAAAAAAAAAAAAABgAAAAAAAAAtnwE+UCzpUCSmvzcHJH4jsKAAAAQAAAA3WTze/p6K06YX0ytFy4OWwEAAAAA>