Home Eric Geier Bio
Image of Eric Geier
Eric Geier

1

Deploying VLANs with Multi-Vendor Support
Managing virtual local area networks  (VLANs) isn’t always easy. When setting up VLANs you must create them on your switches with their VLAN IDs and then you must assign the ports, users, or machines to a particular VLAN ID. On smaller networks,...
802.1x Authentication: Solving Client Issues
WPA/WPA2-Enterprise with 802.1X authentication provides secure and robust Wi-Fi security for businesses. Though 802.1X isn’t the easiest protocol to implement, it should be a must for all organizations with more than a couple of employees using the...
Implement WPA2 Enterprise Encryption on Your WLAN
Implementing WPA2 Enterprise encryption with 802.1X authentication provides the best Wi-Fi security for businesses. However, as you may know, it isn’t easy to setup and support. Nevertheless, you shouldn’t let this stop you. The Personal or...
Manage Network Tasks From the Windows Command Prompt
As a network administrator, one of the Windows command line tools you should be familiar with is net use. It lets you view, create, and delete connections to shared resources from the command prompt. You can connect to shared folders and create mapped network...
Review: Avenda Quick1X 802.1X Configuration Tool
Businesses should use the Enterprise mode of Wi-Fi Protected Access (WPA or WPA2) encryption for their wireless connectivity, instead of the Personal or Pre-Shared Key (PSK) mode. The Enterprise mode uses 802.1X authentication. Wi-Fi users can log into the...
Review: XpressConnect from Cloudpath Networks
Product: XpressConnect from Cloudpath Networks Pros: smart wizard, great customization, great documentation Cons: lacks support for EAP-TLS (client-side certificates) The enterprise mode of WPA/WPA2 encryption, along with 802.1X authentication, can protect...
MAC Address Spoofing for Windows, Linux and Mac
Network adapters come preconfigured from the factory with their own globally unique physical or Media Access Control (MAC) address, which helps them identify themselves when communicating with other networking components. Though you can’t change the...
Using Third-Party 802.1X Clients on Windows, Linux or Mac
Whether you’re using 802.1X authentication for enterprise Wi-Fi encryption and/or for locking down the wired ports, you must use an 802.1X client on the end-user computer or device. You might also hear the client referred to by its technical role as the...
Free and Open: 18 No-Cost Solutions for Your Enterprise Network
These days, most of us have to cut back expenses to survive. Why not start with your computing and networking budget? Maybe sell an expensive appliance or put off buying it and use a free open source solution running on your own computer or server. Perhaps...
Ten Networking Hacks for Your Windows Registry
The Windows Registry is just one of those things we learn to love, and learn to hate. It’s a huge, seemingly unorganized and highly sensitive mess of settings that tell Windows how to behave. As you may know, you can tweak Windows, its features, and...