Robust Security Network

  • Alan Holt
  • Chi-Yu Huang
Part of the Computer Communications and Networks book series (CCN)


In this chapter, we give a detailed description of how to implement a wireless network with enterprise security. Enterprise security requires a RADIUS server for authentication. We show how to configure the FreeRadius for an enterprise WLAN.


  1. 33.
    Falko Timme. How to set up a load balanced MySQL cluster. 3 2006.

Copyright information

© Springer-Verlag London Limited 2010

Authors and Affiliations

  • Alan Holt
    • 1
  • Chi-Yu Huang
    • 2
  1. 1.IP PerformanceBristolUK
  2. 2.Tata Technologies LtdBristolUK

Personalised recommendations