{"id":139,"date":"2017-04-26T21:39:45","date_gmt":"2017-04-27T03:39:45","guid":{"rendered":"http:\/\/www.curli.us\/?p=139"},"modified":"2017-04-29T11:09:32","modified_gmt":"2017-04-29T17:09:32","slug":"wpa2-enterprise","status":"publish","type":"post","link":"https:\/\/www.curli.us\/?p=139","title":{"rendered":"WPA2 Enterprise"},"content":{"rendered":"<p>Just rolled out to my home network; also known as WPA2-EAP or 802.1x EAP, it&#8217;s the last &#8220;unhackable&#8221; wireless encryption protocol. \u00a0The encryption key is handled by the access point (ultimately the RADIUS server) and the client device therefore there is no key to be compromised or changed regularly. \u00a0Authentication is handled by the users credentials on the RADIUS (read Active Directory) server. \u00a0Want to lock out a user? \u00a0No problem; just disable their AD account.<\/p>\n<p>As my wireless network just sits at the same physical address for years on-end, this prevents me from being brute-force attacked by a tech-savvy neighbor.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Just rolled out to my home network; also known as WPA2-EAP or 802.1x EAP, it&#8217;s the last &#8220;unhackable&#8221; wireless encryption protocol. \u00a0The encryption key is handled by the access point (ultimately the RADIUS server) and the client device therefore there is no key to be compromised or changed regularly. \u00a0Authentication is handled by the users &hellip; <a href=\"https:\/\/www.curli.us\/?p=139\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;WPA2 Enterprise&#8221;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"WPA2 Enterprise","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[3,9],"tags":[],"class_list":["post-139","post","type-post","status-publish","format-standard","hentry","category-technology","category-windows-server"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7BMx4-2f","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/www.curli.us\/index.php?rest_route=\/wp\/v2\/posts\/139","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.curli.us\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.curli.us\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.curli.us\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.curli.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=139"}],"version-history":[{"count":1,"href":"https:\/\/www.curli.us\/index.php?rest_route=\/wp\/v2\/posts\/139\/revisions"}],"predecessor-version":[{"id":140,"href":"https:\/\/www.curli.us\/index.php?rest_route=\/wp\/v2\/posts\/139\/revisions\/140"}],"wp:attachment":[{"href":"https:\/\/www.curli.us\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=139"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.curli.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=139"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.curli.us\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=139"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}