Now we'll open the CentOS firewall and configure our access points (APs). Then we'll distribute the CA file to all the computers and configure them with the encryption and authentication settings. Plus we'll set up SQL so you can store your user and AP information in a database rather than text files.
Full story »
http://www.enterprisenetworkingplanet.com –
- Login to post comments