0

http://www.enterprisenetworkingplanet.com

Now we'll open the CentOS firewall and configure our access points (APs). Then we'll distribute the CA file to all the computers and configure them with the encryption and authentication settings. Plus we'll set up SQL so you can store your user and AP information in a database rather than text files.

Full story »
mountaintroll's picture
Created by mountaintroll 14 years 32 weeks ago
Category: High End   Tags:

Best karma users