INTEL WIRELESS
Wired Stuff
WiFi Tablet Corner
My80211 White Papers (Coming Soon!)

Cisco Wireless Compatibility Matrix (Nov. 2011)

Podcasts / Videos

My80211 Videos

Cisco: 802 11 frames with Cisco VIP George Stefanick

Fluke Networks: Minimize Wi Fi Network Downtime

Aruba: Packets never lie: An in-depth overview of 802.11 frames

ATM15 Ten Talk “Wifi drivers and devices”

Houston Methodist Innovates with Wireless Technology

Bruce Frederick Antennas (1/2)

 

Bruce Frederick dB,dBi,dBd (2/2)

Cisco AP Group Nugget

Social Links
Revolution WiFi Capacity Planner

Anchor / Office Extends Ports

 

Peek Inside Cisco's Gear

See inside Cisco's latest wireless gear!

2.4 GHz Channel Overlap

EXAMPLE 1  

EXAMPLE 2

EXAMPLE 3  

LWAPP QoS Packet Tagging

 

 

IEEE 802.11a/g/n Reference Sheet

 

CWSP RELEASE DATE 2/08/2010
  • CWSP Certified Wireless Security Professional Official Study Guide: Exam PW0-204
    CWSP Certified Wireless Security Professional Official Study Guide: Exam PW0-204
    by David D. Coleman, David A. Westcott, Bryan E. Harkins, Shawn M. Jackman

    Shawn Jackman (Jack) CWNE#54 is a personal friend and has been a mentor to me for many years.  I've had the pleasure and opportunity to work with Jack for 4 years. Jack is a great teacher who takes complex 802.11 standards and breaks them down so almost anyone can understand the concept at hand. I'm excited for you brother. Great job and job well done! Put another notch in the belt!

Interference Types

BLUETOOTH
 

Microwave Oven
 

Cordless Phone

JAMMER!
 

  

Sunday
Oct112009

My article about hacking a Cisco WLC / Rogue WCS Attack “All your base are belong to us” published by Author Brandon Carroll on Cisco Unwired - Networkworld.com 

My article about hacking a Cisco WLAN with a Rogue WCS/RRM packet exploit was published by and on Author and CCIE Brandon Carroll’s blog @ Networkword.com.

 

Read about it here:

http://www.networkworld.com/community/node/45961

Tuesday
Oct062009

Cisco WLC / Rogue WCS Attack “All your base are belong to us”

Geo - “I blogged on my site about the unencrypted RRM packet just a few weeks ago. The RRM packet got little attention, but I seen this as a much bigger issue. I seen this as more than just an IP address in the clear but rather a gold mine of information, but just how could it be exploited. “

 

In this tutorial I will share with you an attack using the recently identified and less talked about security vulnerability with the Cisco RRM packet in conjunction with SNMP. I would like to emphasize --- this video is to educate network engineers,  system administrators and security professionals of the potential risk of a enterprise wide attack on your Cisco Unified Wireless Network if Cisco best practices are not followed.

The foundation of this attack is to use the less talked about RRM and widely known SNMP vulnerabilities.  There isn’t  anything new that isn’t already known about these vulnerabilities, but what I will share  is the concept of an attack and the real world potential it may have in your enterprise especially if you use default strings or and more importantly if an attacker knows your strings on the WLC. The concept of the attack is simple, sniff the RRM packet, discovery the WLC, and then join the WLC to the rogue WCS server. After which point your wireless network is at the complete mercy of the hacker. The hacker could create a “rogue” ssid for later outside attack over wireless, complete DOS attack of your wireless network enterprise wide, delete admin accounts on the controllers to prevent you from logging into the controllers while an attack is underway.

 

Sunday
Sep272009

my80211.com OTAP Article picked up at computerweekly.com

Computerweekly.com picked up my article "There is more to the recent Cisco Wireless OTAP issue that isn’t being widely reported." about the controller information being sent in the clear when OTAP is disabled.

Read more about it here:

 http://www.my80211.com/storage/video-cisco-access-points-give-away-network-secrets.htm

 

Sunday
Sep272009

SouthWest goes WiFi!

Geo "I was on the road for the last 6 years and recently settled into a cube position and NOW SouthWest goes WiFi!. I love their comment about price points. Makes me wonder if they will charge by data use or speed. For all you hackers out there.... Rogue AP works great in Air Ports and even better on plans. On a flight not long ago I exchanged files in Adhoc @ 30,000 feet"

From South West:

As you know, we’ve been testing Wi-Fi on four aircraft since March.  I’m happy to announce we have concluded our testing for inflight Wi-Fi and we are very happy with both the technical performance of the system and the response of Customers who have used it. We are pleased to be continuing with our plans to offer satellite-enabled broadband access through California-based Row 44.

This fall we will be moving to the next step of certifying Southwest’s full fleet with plans to begin fleetwide rollout of the Row 44 satellite service in the first quarter of 2010.  Southwest is ready to have this service up and running as soon as possible and we are excited about these next steps.
 
Over the testing phase Customers have been utilizing the service for anything from e-mail to streaming video.  Those interested in using the service during the test period have had the opportunity to log on to the service via their own personal Wi-Fi enabled device (laptops, iPhones, Wi-Fi enabled smart phones, etc).  Additionally, Southwest has been testing a variety of price points for the service and will continue testing price points through the end of 2009.

The technology works, the product is great, and we look forward to offering more Customers Wi-Fi service in 2010.

Leeched from SW.com

Wednesday
Sep232009

Disable your Wireless NIC when plugged into a wired connection!?!?

I am often asked, "Is there away to disable a wireless NIC when I connect my laptop into a wired connection?". The answer is, YES!  In fact it is advisable to only have one NIC on at a time. When both NICs are enabled *Wired and Wireless" PCs can become confused. In fact there is a "costing" that is suppose to happen when you have both NICs enabled, but this doesn’t always work well and most of time doesn’t work at all!.

http://www.my80211.com/client-labs/2009/9/23/disable-your-wireless-nic-when-plugged-into-a-wired-connecti.html

There is security concerns as well. Suppose you are wired into a corperate network and you have your wireless NIC on. Now suppose someone has a rogue access point and your PC connects to it. Once you are connected to the rogue access point the rogue AP can pass you a DHCP and you will then have a layer 3 adjacency with the attacker. It is possible one could then exploit your laptop and breach over into the corperate network.I have never tested this, but perhaps in the near future I may give it a spin.There are a number of options you have to accomplish this ... I will share with you 4 of them

1) BIOS change

2) Intel Supplicant

3) Juniper Odyssey Supplicant

4) Cisco Cssc Supplicant

1) BIOS - Newer PCs come with BIOS options that allow you to modifiy how your wireless and wired NIC operate when both connections are present. For example if you own a HP laptop and you drop into the BIOS you will see LAN/WLAN switching. When enabled, your wireless NIC will disable itself when plugged into a wired connection.

The downside to the BIOS option, suppose you have to roll out hundreds of PCs. Making BIOS changes isn’t as easy as just making a change to an image.

 2) Intel Supplicant - Intel is everywhere and its likely you have Intel wireless NICs in most of your PCs. Intel calls this functionality  ADAPTER SWITCHING.

Click on your Intel wireless icon in your system tray--> Tools --> Admin Tools --> Application Settings --> Adapter Switching

3) Juniper Odyssey  Supplicant - This supplicant is one that you have to pay for, but I am a big fan of the juniper client, I've used it for years and allows for easier administration of devices. Juniper calls this functionality WIRELESS SUPPRESSION.

Click on your Juniper wireless icon in your system tray--> Tools --> Options --> Wireless Suppression 

4) Cisco CSSC - If you use CSSC you will find the NIC option under Advance Settings.

From client mode--> Advance settings -->Simultaneous Connection portion of the Security Settings pane --> Only allow one connection at a time to restrict the Client to creating only a single connection (prevent multihomed configurations).Note: the preference of the media type is fixed for wired/Ethernet, when both types are available within a network.

Enjoy!

Sunday
Sep202009

Cisco: Wireless data use will double every year

 

George - I came across this from another blog and found it interesting... I agree, wireless data is expanding leap and bounds.

The worldwide demand for wireless data capacity is enormous and growing at an incredible rate. Between 2008 and 2013, Cisco says wireless data traffic will double every year, reaching more than 2 exabytes per month by 2013.

Mobile data traffic will grow from its current 1 petabyte per month to 1 exabyte per month in half the time it took fixed data traffic to do so, Cisco reported. The internet grew from 1 petabyte per month to 1 exabyte per month in 14 years.

Keeping up with this data traffic is enormously expensive for the network carriers like AT&T, Verizon Wirless and Sprint, which have invested billions of dollars upgrading their systems to 3G standards. The next leap to 4G will be even more expensive.

The reason for this huge surge in demand for data is super fast connections on smartphones like BlackBerry and iPhone, which have turned the consumer cell phone market into a competition for which carrier and device can offer more features.

A BlackBerry generates more data traffic per user than 30 feature cell phones, Cisco said. Imagine if 4 billion mobile phone users all had data demand as high as that and you can see why telecom expense management is a challenging proposition.ADNFCR-2628-ID-19368816-ADNFCR

http://www.visagemobile.com/blog/2009/09/18/cisco-wireless-data-use-will-double-every-year/

Monday
Sep142009

802.3at-2009 Power over Ethernet (PoE) Plus Standard Ratified

 

Geo – “Another ratified standard indirectly related to wireless this week. Those of us who have used the Cisco 1252 “brick” access points know these puppy’s require the additional power also known at 802.3at, when running both radios.  “

http://www.my80211.com/home/2009/9/14/8023at-2009-power-over-ethernet-poe-plus-standard-ratified.html

The IEEE recently ratified 802.3at, a new Power over Ethernet Plus standard. The IEEE 802.3at-2009 Power over Ethernet (PoE) Plus standard defines the technology for powering a wide range of powered devices at up to 25W over existing CAT5e and above cables.

Mike McCormack, Chair of the IEEE P802.3at Task Force said, "IEEE 802.3at uses the Link Layer Discover Protocol (LLPD) from IEEE Std 802.1AB, which allows dynamic power allocation and negotiation down to 1/10th of a Watt, and associated technology including Type, Length, Values (TLVs) from IEEE 802.3bc, which was also recently approved. This will allow equipment manufactures to manage their power supply costs and efficiencies at levels not possible with previous standards, and to cut their costs in the process."

Click to read more ...

Sunday
Sep132009

International Hacker Pleads Guilty for Massive "Wireless" Hack of U.S. Retail Networks

Geo - " This hack rippled through the security community and the general public by and large. Reportable over 40 million credit cards were exposed during this hack. This single event is the cause for the new PCI regulations and policies being implemented today. Those of us in wireless knew it was only a matter of time before such a hack of this magnitude would occur.Just last week I noticed a very large retail chain still using WEP, Apparently they didn’t get the memo!" LOL

http://www.my80211.com/home/2009/9/13/international-hacker-pleads-guilty-for-massive-wireless-hack.html

According to the indictments to which Gonzalez pleaded guilty, he and his co-conspirators broke into retail credit card payment systems through a series of sophisticated techniques, including "wardriving" and installation of sniffer programs to capture credit and debit card
numbers used at these retail stores.  Wardriving involves driving around in a car with a laptop computer looking for accessible wireless computer networks of retailers. Using these techniques, Gonzalez and his co-conspirators were able to steal more than 40 million credit and debit card numbers from retailers.  Also according to the indictments, Gonzalez and his co-conspirators sold the numbers to others for their fraudulent use and engaged in ATM fraud by encoding the data on the magnetic stripes of blank cards and withdrawing tens of thousands of dollars at a time from ATMs.  According to the indictments, Gonzalez and his co-conspirators concealed and laundered their fraud proceeds by using anonymous Internet-based currencies both within the
United States and abroad, and by channeling funds through bank accounts in Eastern Europe.

Based on the terms of the Boston plea agreement, Gonzalez faces a minimum of 15 years and a maximum of 25 years in prison.  Based on the New York plea agreement, Gonzalez faces up to 20 years in prison, which the parties have agreed should run concurrently.  He also faces a fine of up to twice the pecuniary gain, twice the victims' pecuniary loss or $250,000, whichever is greatest, per count for the Boston case and a maximum fine of $250,000 for the New York case.  Gonzalez
also agreed to an order of restitution for the loss suffered by his victims, and forfeiture of more than $2.7 million as well as multiple items of real estate and personal property, including a condo in Miami,
a 2006 BMW 330i, a Tiffany diamond ring and Rolex watches.  Included in the forfeited currency is more than $1 million in cash, which Gonzalez had buried in a container in his backyard.  Sentencing
is scheduled for Dec. 8, 2009.

Thanks to Reuters

http://www.reuters.com/article/pressRelease/idUS159434+11-Sep-2009+PRN20090911

Saturday
Sep122009

OTAP UPDATE 9.12.09: OTAP to be removed from future code releases and RRM packet encrytped !

OTAP UPDATE 9.12.09: This week Cisco released a plan to follow up with a patch update to 6.x, which REMOVES OTAP discovery method and encrypts the information element in the RRM discovery packet.

I like this move and something I stated from the early release of this vulnerability. The RRM packet sending controller IP information in the clear to share RRM neighbor information is not necessary for access points that have already joined a controller. This infromation should be encrypted.This is comforting news for ANY enterprise or healthcare security team.

I am disappointed the release will be 6.x. Many users are on harbor code 4.2.x who won’t be able to take advantage of this patch. I suspect Cisco will release a 4.2 fix as well, we shall see!

 

http://tools.cisco.com/security/center/viewAlert.x?alertId=18919

Saturday
Sep122009

802.11n WiFi Standard Finally Approved!

Has it been really 7 years!? There were early leaks posted on various sites the IEEE was close to an approval. Sites are reporting a formal announcement from the IEEE next week. 802.11n will bring 160+ mbps actual throughput to wireless users. This is 7x’s faster than the current 802.11a/g technology. I expect to see more enterprise customers taking full advantage of 802.11n in future deployments with this final approval.

Specific to Cisco 802.11n – Things to note:

1252 – Requires 802.3at power for dual radio operation and can operate in LWAPP and Autonomous modes.

1242 – Requires 802.3af power to operate and currently in LWAPP mode only. There is a prerequisite of 5.2 firmware or greater on the controller code. Cisco offers 802.11a/g/n and 802.11g/n radio options.

 802.11n - Did you know?

  • It has real world throughput that clocks in at 160 Mbps or faster—seven times faster than older 802.11g networks.

  • At 300 feet, 802.11g performance plummets to 1 Mbps. 802.11n networks operate at up to 70 Mbps—70 times faster than 802.11g.

  • The key to this speed is MIMO (multiple input/multiple output) which uses multiple antennas to send and receive digital data in multiple simultaneous radio streams, thus multiplying total performance.

  • The approved standard isn’t expected to cause any hardware changes for the larger manufactures.

  • 802.11n is backward compatible with legacy device 802.11a,b,g
  • 802.11n can live in the 5GHz and 2.4 GHz spectrums; ideally 5 GHz to allow for channel bonding

  • 802.11n can be deployed with 20 or 40 MHz OFDM channels

  • To take full advantage of  802.11n wireless speeds, you need to have gig to the access point!

http://www.my80211.com/did-you-know/2009/9/12/80211n-wifi-standard-finally-approved.html

Saturday
Sep052009

There is more to the recent Cisco Wireless OTAP issue that isn’t being widely reported.

In the last week you heard about the OTAP issue. OTAP stands for Over The Air Provisioning. It is a means whereby a Cisco access point can find a Cisco controller to initiate a join process.

OTAP when enable, by design , sends the controller mac and ip information in the clear every 60 seconds in the multicast RRM packet. This aids access points to join the network.

Cisco recommends you disable OTAP during normal production. OTAP should only be deployed during the deployment phase of a wireless network.

What isn’t being reported, when disabled the RRM packets still includes the controller mac and ip address!

 Enjoy the video  

http://www.my80211.com/security-labs/2009/9/5/there-is-more-to-the-recent-cisco-wireless-otap-issue-that-i.html

 

Monday
Aug172009

WLC Safe Harbor Code, what is it?? What does it mean to you ?

In your travels you may hear the term safe harbor code, or Cisco’s validated code. So you probably wonder what it is and what does it mean to you.

Cisco has identified 3 WLAN controller code releases and has elevated their status designated by Cisco. The code versions are 4.2.176, 4.2.205 and 4.2.207. Cisco has defined three programs; AssureWave, Cisco Validated Design and Safe Harbor. These three programs are a collaborative effort of sorts.

Read more about it ...

http://www.my80211.com/did-you-know/2009/8/18/wlc-safe-harbor-code-what-is-it-what-does-it-mean-to-you.html

 

Click to read more ...

Monday
Aug032009

8/5/2009 11:30 am (PST) - Free Guide to CCNA Wireless Certification w/ Brandon Carroll

If you are studying for your Cisco Wireless Certification, specifically the CCNA Wireless. You don't want to miss this 30 minute web-x by Brandon Carroll, author of Cisco Press CCNA Wireless Certification Guide!

Topic:   Guide to CCNA Wireless Certification
Session dates:   Wednesday, August 5, 2009
Starting time:   11:30 am, Pacific Daylight Time (San Francisco, GMT-07:00)
Duration:   30 minutes
Presenters:   Ascolta 2
Description:  

This webinar provides information on other resources recommended for CCNA Wireless study as well as a look at what one can expect if taking a self-study path, a self-study path with some practice using production equipment, or an instructor-led course with dedicated lab equipment.

Who Should Attend: Those beginning the CCNA Wireless or considering the CCNA Wireless Certification track would benefit from attending as well as those that want a look at the technical content in the IUWNE v1.0 course.

http://bit.ly/4y2nGU

 

Saturday
Aug012009

Use your IPOD Touch or IPhone as a flashcard deck! (Study, Study, Study)

I can’t tell you how much time I devote to study. The hours are countless and the nights are long. If you are in the technology field you know my pain. I needed to find a way to maximize my study efforts, take advantage of downtime and more importantly repetition of the details so that I would have them ingrained into my brain.

I was recently introduced to a Mental Case (http://www.maccoremac.com/http://www.maccoremac.com ), no no it’s not your girlfriends ex-husband or some stalker girl you dated, it’s a software program that runs on your IPOD Touch or IPhone.

Mental Case allows you download customizable flash decks from Flash Card Exchange, (http://www.flashcardexchange.com/). There are thousands of slide decks currently being shared on Flash Card Exchange. What is really cool, for a small fee you can create your own Flash Decks which you can download to your POD. You can also share your deck with the world if you like.

Currently, there is a pretty wide selection of Cisco and some CWNP decks available. But again, create your own decks and study exactly what you need to! I would also warn you if you choose to use someone else’s flash deck make sure there answers are correct! LOL

 

 

Tuesday
Jul282009

7/27/09 - Cisco Security Advisory: Multiple Vulnerabilities in Cisco Wireless LAN Controllers

Summary

Multiple vulnerabilities exist in the Cisco Wireless LAN Controller (WLC) platforms. This security advisory outlines the details of the following vulnerabilities:

  • Malformed HTTP or HTTPS authentication response denial of service vulnerability
  • SSH connections denial of service vulnerability
  • Crafted HTTP or HTTPS request denial of service vulnerability
  • Crafted HTTP or HTTPS request unauthorized configuration modification vulnerability

http://www.my80211.com/cisco-field-alerts/2009/7/28/72709-cisco-security-advisory-multiple-vulnerabilities-in-ci.html

 

Saturday
Jul252009

WHAT CISCO DOESN'T WANT YOU TO KNOW ABOUT SMARTNET ON LWAPP/CAPWAP APs WILL SAVE YOU THOUSANDS! 

Do you have smartnet on your Cisco LWAPP/CAPWAP access points? Save yourself the dough. You can save THOUSANDS. You do the math!

http://www.my80211.com/did-you-know/2009/7/25/what-cisco-doesnt-want-you-to-know-about-smartnet-on-lwappca.html

 

Sunday
Jul192009

You have wireless client issues? What is your Wireless NIC system event log telling you?

 I have an interesting nugget this week on the NIC system events. I was surprised to find this a few years ago and I’ve used it as another tool to troubleshoot wireless client problems.

Did you know when you associate to an access point your wireless NIC reports to the OS a 4201 code? Or, when your wireless NIC loses connectivity it reports a 4202 code?

http://www.my80211.com/client-labs/2009/7/19/you-have-wireless-client-issues-what-is-your-wireless-nic-sy.html 

 

Sunday
Jul122009

Cisco Inks "6" CCIE Wireless Professionals ! 

Cisco inks 20,003 CCIEs wouldwide!

As of 6/29/09 there is a total of 20,003 CCIEs worldwide. Of which, 6 are wireless IEs.


Interesting facts about the CCIE number !

CCIE Numbering and Recertification

Upon successful completion of the hands on lab exam, a new CCIE is awarded a CCIE number. The first CCIE number allocated (in 1993) was 1024, and has increased incrementally from there. A lower number indicates that the CCIE was awarded some time back, a higher number indicated a more recently awarded certification. As of July 2009, the highest CCIE number allocated was just under 25000.

Number 1024 was allocated to the first CCIE lab location, rather than to an individual, and featured as a plaque at the entrance to the lab. Number 1025 was awarded to Stuart Biggs, who created the first written exam and first lab exam. The first person to pass both CCIE written and lab exams was Terrance Slattery, who was consulting to Cisco at the time when the lab was being devised. Terry Slattery (CCIE 1026) was therefore the first CCIE who passed both exams, and the first CCIE who was not an employee of Cisco.

Any CCIE who obtains further CCIE certifications, is not awarded any further numbers, the new CCIE certification is awarded under the same number as the original.

Every two years a CCIE has to take a CCIE written test to retain the certification (known as recertification, or recert). If this is not done, the CCIE is then said to be in suspended status. The CCIE certification is not recognised by Cisco as current at this point. After one further year, if a written test has not been undertaken and passed, the CCIE is then revoked. The CCIE certification can then only be re-gained by taking the written exam and lab exam from scratch.

(Information provided by WiKi)

 

 

Tuesday
Jul072009

CCNA Wireless Official Exam Certification Guide

I completed my third go around with the CCNA Wireless Offical Certification Guide.

First I will mention it is an easy read. Brandon Carroll did a great job laying out the foundation of 802.11 based on concepts and standards. He then leads into protocols and architecture, which sets the stage for the reader to better understanding of Cisco’s WLAN controller based product.

If you are like me having something new from Cisco Press on wireless, especially on the LWAPP product was a pleasure to read. My IEEE 802.11 Handbook. CWNP (cwna, cwsp, cwap) books, Bruce Alexander (Site Survey) and P. Roshan / J. Leary (802.11 Fundamentals) books were getting a bit old. I was excited to get my hands on this book. It was harder finding the time to sit down and enjoying the book for all its technical worth.

I was disappointed, however, with the amount of technical errors. I think the technical reviewers Bobby Corcoran and Robert Marg did an injustice to the book and frankly the author. I found a number of mentions that caused me to pull up the IEEE handbook and other reference material to discount some of the mentions. Although, I am not surprised, it is a technical book and as life goes within Cisco --- You have to answer it the Cisco way.

Again, just my two cents. I recommend the book, I just caution the readers to do their home work …..

Thursday
Jan222009

Welcome to my80211.com

Welcome to my80211.com journal (launched January 2009), where I will share with you my journey through 802.11. I'm George Stefanick, a Sr Wireless Consultant for a Healthcare and Enterprise Mobility company located in the greater Philadelphia area, servicing customers in the Healthcare and Enterprise industries.

By day ~ I design, deploy, secure, conduct pre/post sales and troubleshoot Data, VoIP and RFID WLANs in today's Healthcare and Enterprise environments.

Deploying a properly designed WLAN in today's Healthcare and Enterprise environments is no easy task and should never be considered lightly. We shouldn't be surprised, wireless users today will not tolerate 'issues' of any sort and demand the same reliability as wired connections. As wireless technology develops, so has the demand of mobile applications. In the last two years, use of mobile applications relying specifically on wireless have ski rocketed. Just five years ago, VoIP over 802.11 was a pipe dream, today it's adopted by most Healthcare systems. The next fronteer is active RFID over wireless.

By night ~as the saying goes, "the devil is in the details" I am fascinated with the 802.11 protocol. In fact its an addiction of sorts. With the recent addition of the IEEE 802.11n standard, the black magic is still alive and well.

So, you may ask, why the journal. Its pretty simple I suppose. I want to have a place to call home for my labs, studies, security exploits, application reviews, troubleshooting efforts, spectrum analysis, and certifications. Wireless is an ever expanding force in todays enterprise networks and it's growth is unmatched in today's networking.

These studies have been of great value to customers and wireless engineers a like. So I hope you find my work of value and benefits you in your personal journey with 802.11.

Our journey begins right here with packet captures, performance enhancements, troubleshooting, WLAN security (hacking), RFID, VoIP over wireless, spectrum analysis and wireless certifications.

So lets dive in shall we !

 

George M. Stefanick Jr., CCNA, CWNA,CQS-CWLANSS

 

Page 1 ... 12 13 14 15 16