0

http://www.enterprisenetworkingplanet.com

Now we'll open the CentOS firewall and configure our access points (APs). Then we'll distribute the CA file to all the computers and configure them with the encryption and authentication settings. Plus we'll set up SQL so you can store your user and AP information in a database rather than text files.

Full story »
mountaintroll's picture
Created by mountaintroll 10 years 10 weeks ago
Category: High End   Tags:

Best karma users