{"version":"1.0","provider_name":"Sneh Patel","provider_url":"https:\/\/snehpatel.com","title":"Cisco Meraki iPSK using FreeRADIUS - Sneh Patel","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"SLdi15DoS9\"><a href=\"https:\/\/snehpatel.com\/index.php\/2020\/05\/30\/cisco-meraki-ipsk-using-freeradius\/\">Cisco Meraki iPSK using FreeRADIUS<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/snehpatel.com\/index.php\/2020\/05\/30\/cisco-meraki-ipsk-using-freeradius\/embed\/#?secret=SLdi15DoS9\" width=\"600\" height=\"338\" title=\"&#8220;Cisco Meraki iPSK using FreeRADIUS&#8221; &#8212; Sneh Patel\" data-secret=\"SLdi15DoS9\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/snehpatel.com\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"Choosing an authentication protocol for networking devices is one of the critical tasks. And when we talk about wireless authentication WPA2 and WPA2-Enterprise are the most used protocol. When we think of enterprise wireless network there are various challenges that an administrator may face while choosing which protocol to use. Each method has its own ... Read more","thumbnail_url":"https:\/\/snehpatel.com\/wp-content\/uploads\/2020\/09\/image-1-1024x355.png"}