{"id":576,"date":"2022-11-20T16:39:26","date_gmt":"2022-11-20T21:39:26","guid":{"rendered":"https:\/\/casioaktech.com\/index.php\/home\/"},"modified":"2026-02-26T01:45:18","modified_gmt":"2026-02-26T06:45:18","slug":"home","status":"publish","type":"page","link":"https:\/\/casioaktech.com\/","title":{"rendered":"Home"},"content":{"rendered":"<ul class=\"wp-block-latest-posts__list is-grid columns-3 has-author aligncenter wp-block-latest-posts\"><li><div class=\"wp-block-latest-posts__featured-image\"><img fetchpriority=\"high\" decoding=\"async\" width=\"640\" height=\"322\" src=\"https:\/\/casioaktech.com\/wp-content\/uploads\/2026\/04\/EAP-TLS-Spiderman.jpeg\" class=\"attachment-large size-large wp-post-image\" alt=\"\" style=\"\" srcset=\"https:\/\/casioaktech.com\/wp-content\/uploads\/2026\/04\/EAP-TLS-Spiderman.jpeg 705w, https:\/\/casioaktech.com\/wp-content\/uploads\/2026\/04\/EAP-TLS-Spiderman-300x151.jpeg 300w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/div><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/casioaktech.com\/index.php\/2026\/04\/13\/extensible-authentication-protocol-eap-quick-reference-guide\/\">Extensible Authentication Protocol (EAP) Quick Reference Guide<\/a><div class=\"wp-block-latest-posts__post-author\">by Dylan<\/div><div class=\"wp-block-latest-posts__post-excerpt\">In this guide I want to break down the different Extensible Authentication Protocol (EAP) methods, and their use cases. This guide isn\u2019t a deep dive into the framework itself, but rather a quick way to understand which method best fits your current situation. Let\u2019s have a quick introduction to the protocol. Extensible Authentication Protocol EAP is the framework of the authentication process, it allows the authentication server to select an authentication method supported by the Supplicant. This includes transporting the challenges, responses, and messages, which may include or protect credentials depending on the method used. The supplicant is client software\u2026 <a class=\"wp-block-latest-posts__read-more\" href=\"https:\/\/casioaktech.com\/index.php\/2026\/04\/13\/extensible-authentication-protocol-eap-quick-reference-guide\/\" rel=\"noopener noreferrer\">Read more<span class=\"screen-reader-text\">: Extensible Authentication Protocol (EAP) Quick Reference Guide<\/span><\/a><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/casioaktech.com\/index.php\/2026\/02\/08\/mvrp-overview\/\">MVRP Overview<\/a><div class=\"wp-block-latest-posts__post-author\">by Dylan<\/div><div class=\"wp-block-latest-posts__post-excerpt\">During my time in the field, I\u2019ve seen a lot of different network configurations. Some networks I see are thoughtfully designed, others not so much. I have noticed that the majority of the deployments I have witnessed have under utilized many of the features that make the equipment worth the price tag in the first place. Why spend thousands of dollars on enterprise networking equipment if you aren\u2019t going to use the knobs and dials that you paid for? There are many examples of this, but today I wanted to bring attention to one that I find especially useful. Multiple\u2026 <a class=\"wp-block-latest-posts__read-more\" href=\"https:\/\/casioaktech.com\/index.php\/2026\/02\/08\/mvrp-overview\/\" rel=\"noopener noreferrer\">Read more<span class=\"screen-reader-text\">: MVRP Overview<\/span><\/a><\/div><\/li>\n<li><div class=\"wp-block-latest-posts__featured-image\"><img decoding=\"async\" width=\"640\" height=\"745\" src=\"https:\/\/casioaktech.com\/wp-content\/uploads\/2026\/01\/Media-880x1024.png\" class=\"attachment-large size-large wp-post-image\" alt=\"\" style=\"\" srcset=\"https:\/\/casioaktech.com\/wp-content\/uploads\/2026\/01\/Media-880x1024.png 880w, https:\/\/casioaktech.com\/wp-content\/uploads\/2026\/01\/Media-258x300.png 258w, https:\/\/casioaktech.com\/wp-content\/uploads\/2026\/01\/Media-768x894.png 768w, https:\/\/casioaktech.com\/wp-content\/uploads\/2026\/01\/Media-1320x1536.png 1320w, https:\/\/casioaktech.com\/wp-content\/uploads\/2026\/01\/Media-1760x2048.png 1760w, https:\/\/casioaktech.com\/wp-content\/uploads\/2026\/01\/Media.png 1856w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/div><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/casioaktech.com\/index.php\/2026\/01\/31\/arubacx-igmp-configuration-guide\/\">Quick & Easy ArubaCX IGMP Configuration Guide<\/a><div class=\"wp-block-latest-posts__post-author\">by Dylan<\/div><div class=\"wp-block-latest-posts__post-excerpt\">DISCLAIMER:This is not meant to be a complete in-depth guide, just sharing the basics that might help in a time crunch. Internet Group Management Protocol (IGMP) operates at Layer 3 and is responsible for managing multicast group membership on a network. In a well designed setup, the IGMP querier runs on the network gateway this may be a router, firewall, or Layer 3 switch. This device periodically sends queries to determine which hosts want to receive specific multicast streams, allowing it to maintain accurate group membership information. At Layer 2, IGMP Snooping allows switches to efficiently handle multicast traffic. The\u2026 <a class=\"wp-block-latest-posts__read-more\" href=\"https:\/\/casioaktech.com\/index.php\/2026\/01\/31\/arubacx-igmp-configuration-guide\/\" rel=\"noopener noreferrer\">Read more<span class=\"screen-reader-text\">: Quick & Easy ArubaCX IGMP Configuration Guide<\/span><\/a><\/div><\/li>\n<li><div class=\"wp-block-latest-posts__featured-image\"><img decoding=\"async\" width=\"640\" height=\"427\" src=\"https:\/\/casioaktech.com\/wp-content\/uploads\/2024\/11\/pexels-photo-23781-1024x683.jpg\" class=\"attachment-large size-large wp-post-image\" alt=\"High-resolution image of a satellite orbiting Earth, showcasing space technology.\" style=\"\" srcset=\"https:\/\/casioaktech.com\/wp-content\/uploads\/2024\/11\/pexels-photo-23781-1024x683.jpg 1024w, https:\/\/casioaktech.com\/wp-content\/uploads\/2024\/11\/pexels-photo-23781-300x200.jpg 300w, https:\/\/casioaktech.com\/wp-content\/uploads\/2024\/11\/pexels-photo-23781-768x512.jpg 768w, https:\/\/casioaktech.com\/wp-content\/uploads\/2024\/11\/pexels-photo-23781-1536x1024.jpg 1536w, https:\/\/casioaktech.com\/wp-content\/uploads\/2024\/11\/pexels-photo-23781-2048x1365.jpg 2048w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/div><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/casioaktech.com\/index.php\/2024\/11\/13\/receiving-pictures-from-space-with-sound-tuning-into-weather-satellites\/\">Receiving Pictures from Space with Sound: Tuning Into Weather Satellites<\/a><div class=\"wp-block-latest-posts__post-author\">by Dylan<\/div><div class=\"wp-block-latest-posts__post-excerpt\">Things You Will Need: Hardware: RTL-SDR Bundle \u2013 This affordable software-defined radio bundle is essential for capturing satellite signals. You can get it here on Amazon. Software: SDR Application \u2013 You\u2019ll need a software-defined radio application to tune into the satellite frequencies. I used SDR++, which is user-friendly and powerful. You can download it here. Audio Recorder (WAV format support) \u2013 This will be used to capture and save audio from the satellites. Most SDR applications, like SDR++, already have built-in functionality for audio recording. SatDump \u2013 This software helps decode satellite signals and convert them into images or data.\u2026 <a class=\"wp-block-latest-posts__read-more\" href=\"https:\/\/casioaktech.com\/index.php\/2024\/11\/13\/receiving-pictures-from-space-with-sound-tuning-into-weather-satellites\/\" rel=\"noopener noreferrer\">Read more<span class=\"screen-reader-text\">: Receiving Pictures from Space with Sound: Tuning Into Weather Satellites<\/span><\/a><\/div><\/li>\n<li><div class=\"wp-block-latest-posts__featured-image\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"299\" src=\"https:\/\/casioaktech.com\/wp-content\/uploads\/2024\/10\/20241011_203440-1-1024x478.jpg\" class=\"attachment-large size-large wp-post-image\" alt=\"\" style=\"\" srcset=\"https:\/\/casioaktech.com\/wp-content\/uploads\/2024\/10\/20241011_203440-1-1024x478.jpg 1024w, https:\/\/casioaktech.com\/wp-content\/uploads\/2024\/10\/20241011_203440-1-300x140.jpg 300w, https:\/\/casioaktech.com\/wp-content\/uploads\/2024\/10\/20241011_203440-1-768x359.jpg 768w, https:\/\/casioaktech.com\/wp-content\/uploads\/2024\/10\/20241011_203440-1-1536x717.jpg 1536w, https:\/\/casioaktech.com\/wp-content\/uploads\/2024\/10\/20241011_203440-1-2048x956.jpg 2048w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/div><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/casioaktech.com\/index.php\/2024\/10\/16\/dialing-up-dinner-hacking-a-blue-light-phone-to-order-pizza\/\">Dialing Up Dinner: Hacking a Blue Light Phone to Order Pizza<\/a><div class=\"wp-block-latest-posts__post-author\">by Dylan<\/div><div class=\"wp-block-latest-posts__post-excerpt\">During a deployment of blue light phones at a university, one of the units got damaged and needed replacing. Somehow, I ended up with a broken Talkaphone VoIP 600 sitting next to my desk. That\u2019s when a thought crossed my mind: wouldn\u2019t it be hilarious to use an emergency phone to order pizza? With that idea in mind, I rushed home to see if I could revive the unit. Unfortunately, the circuit board was fried, and the components were far too small for me to attempt soldering by hand. Luckily, I happened to chat with someone on the engineering team\u2026 <a class=\"wp-block-latest-posts__read-more\" href=\"https:\/\/casioaktech.com\/index.php\/2024\/10\/16\/dialing-up-dinner-hacking-a-blue-light-phone-to-order-pizza\/\" rel=\"noopener noreferrer\">Read more<span class=\"screen-reader-text\">: Dialing Up Dinner: Hacking a Blue Light Phone to Order Pizza<\/span><\/a><\/div><\/li>\n<li><div class=\"wp-block-latest-posts__featured-image\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"299\" src=\"https:\/\/casioaktech.com\/wp-content\/uploads\/2024\/09\/20240916_162548-1024x478.jpg\" class=\"attachment-large size-large wp-post-image\" alt=\"\" style=\"\" srcset=\"https:\/\/casioaktech.com\/wp-content\/uploads\/2024\/09\/20240916_162548-1024x478.jpg 1024w, https:\/\/casioaktech.com\/wp-content\/uploads\/2024\/09\/20240916_162548-300x140.jpg 300w, https:\/\/casioaktech.com\/wp-content\/uploads\/2024\/09\/20240916_162548-768x359.jpg 768w, https:\/\/casioaktech.com\/wp-content\/uploads\/2024\/09\/20240916_162548-1536x717.jpg 1536w, https:\/\/casioaktech.com\/wp-content\/uploads\/2024\/09\/20240916_162548-2048x956.jpg 2048w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/div><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/casioaktech.com\/index.php\/2024\/09\/16\/emergency-bluelight-stations\/\">Emergency BlueLight Stations<\/a><div class=\"wp-block-latest-posts__post-author\">by Dylan<\/div><div class=\"wp-block-latest-posts__post-excerpt\">Things have been a bit busy lately; so I figured I would leave some pictures of what I have been working on recently.\u00a0 These are emergency blue light stations! Bluelight emergency phones, commonly seen in areas like campuses and parking garages, are essential safety stations equipped with highly visible blue lights for quick access during emergencies.\u00a0 These phones use a cellular router and an Analog Telephone Adapter (Last Picture) for reliable communication. The cellular router connects the phone (Keypad in first picture) to the mobile network, while the ATA converts the keypad\u2019s analog signal for digital transmission. This setup enables\u2026 <a class=\"wp-block-latest-posts__read-more\" href=\"https:\/\/casioaktech.com\/index.php\/2024\/09\/16\/emergency-bluelight-stations\/\" rel=\"noopener noreferrer\">Read more<span class=\"screen-reader-text\">: Emergency BlueLight Stations<\/span><\/a><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/casioaktech.com\/index.php\/2024\/08\/31\/comptia-pentest-what-to-expect-and-how-to-prepare\/\">CompTIA Pentest+: What to Expect and How to Prepare<\/a><div class=\"wp-block-latest-posts__post-author\">by Dylan<\/div><div class=\"wp-block-latest-posts__post-excerpt\">While studying for the PenTest+ exam, I discovered a couple helpful resources that could benefit others preparing for the same test.\u00a0 When I study for CompTIA exams I always find myself researching what to expect on the exam, Wasting time worrying about how difficult the test may be instead of studying for the exam like I originally intended to.\u00a0 \u00a0My first piece of advice for preparing for the Pentest+, or any certification exam is to relax.\u00a0 You can\u2019t effectively study for the exam if you are constantly worried about failing.\u00a0 Failing is part of any meaningful journey, and this is\u2026 <a class=\"wp-block-latest-posts__read-more\" href=\"https:\/\/casioaktech.com\/index.php\/2024\/08\/31\/comptia-pentest-what-to-expect-and-how-to-prepare\/\" rel=\"noopener noreferrer\">Read more<span class=\"screen-reader-text\">: CompTIA Pentest+: What to Expect and How to Prepare<\/span><\/a><\/div><\/li>\n<li><div class=\"wp-block-latest-posts__featured-image\"><img loading=\"lazy\" decoding=\"async\" width=\"422\" height=\"281\" src=\"https:\/\/casioaktech.com\/wp-content\/uploads\/2024\/04\/PFC-6006.jpg\" class=\"attachment-large size-large wp-post-image\" alt=\"\" style=\"\" srcset=\"https:\/\/casioaktech.com\/wp-content\/uploads\/2024\/04\/PFC-6006.jpg 422w, https:\/\/casioaktech.com\/wp-content\/uploads\/2024\/04\/PFC-6006-300x200.jpg 300w\" sizes=\"(max-width: 422px) 100vw, 422px\" \/><\/div><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/casioaktech.com\/index.php\/2024\/04\/29\/enhancing-voip-communication-for-fire-panels-leveraging-fsk-and-dtmf-modulation-techniques\/\">Enhancing VOIP Communication for Fire Panels: Leveraging FSK and DTMF Modulation Techniques<\/a><div class=\"wp-block-latest-posts__post-author\">by Dylan<\/div><div class=\"wp-block-latest-posts__post-excerpt\">In the realm of Voice over Internet Protocol (VOIP), effective communication with Fire Panels is paramount for ensuring the safety and security of premises. Central to this endeavor are modulation techniques like Frequency Shift Keying (FSK) and Dual-Tone Multi-Frequency (DTMF), which play a crucial role in transmitting alarm signals and control commands. In this blog post, we\u2019ll explore the fundamentals of FSK and DTMF modulation techniques and how they contribute to enhancing VOIP communication for Fire Panels, particularly in the context of industry-standard protocols like SIA and Contact ID. Understanding FSK and DTMF: FSK modulation involves varying the frequency of\u2026 <a class=\"wp-block-latest-posts__read-more\" href=\"https:\/\/casioaktech.com\/index.php\/2024\/04\/29\/enhancing-voip-communication-for-fire-panels-leveraging-fsk-and-dtmf-modulation-techniques\/\" rel=\"noopener noreferrer\">Read more<span class=\"screen-reader-text\">: Enhancing VOIP Communication for Fire Panels: Leveraging FSK and DTMF Modulation Techniques<\/span><\/a><\/div><\/li>\n<\/ul>\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-576","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/casioaktech.com\/index.php\/wp-json\/wp\/v2\/pages\/576","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/casioaktech.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/casioaktech.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/casioaktech.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/casioaktech.com\/index.php\/wp-json\/wp\/v2\/comments?post=576"}],"version-history":[{"count":30,"href":"https:\/\/casioaktech.com\/index.php\/wp-json\/wp\/v2\/pages\/576\/revisions"}],"predecessor-version":[{"id":1203,"href":"https:\/\/casioaktech.com\/index.php\/wp-json\/wp\/v2\/pages\/576\/revisions\/1203"}],"wp:attachment":[{"href":"https:\/\/casioaktech.com\/index.php\/wp-json\/wp\/v2\/media?parent=576"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}