No. There are some bandwidth restrictions and we monitor the bandwidth 
utilization on that VLAN but nothing more than that.

Our physical location is such that the wireless signal strength drops before it 
hits any permanent establishments or parking lots not on our premises. Other 
than intentional wardriving, there would be very few circumstances for casual 
pedestrian access.

-----Original Message-----
From: Malcolm Reitz [mailto:malcolm.re...@live.com] 
Sent: Wednesday, June 09, 2010 9:17 AM
To: NT System Admin Issues
Subject: RE: OTish: Wireless network configuration

Do you do anything to prevent random people outside your office from connecting 
to your guest wireless network?

-Malcolm

-----Original Message-----
From: Joe Tinney [mailto:jtin...@lastar.com]
Sent: Tuesday, June 08, 2010 21:21
To: NT System Admin Issues
Subject: RE: OTish: Wireless network configuration

While I'm not the one that configured them, our Cisco wireless access points 
are configured with two SSID's: one on a VLAN that goes to our transparent 
proxy and without access to our other networks and the other on a VLAN that 
functions just like our client wired network segment. The first one is an open 
Guest network and the latter is WPA2 secured.

I'm not sure what your network devices would enable you to do but this has been 
rock solid configuration for us.

-----Original Message-----
From: Kurt Buff [mailto:kurt.b...@gmail.com]
Sent: Tuesday, June 08, 2010 7:29 PM
To: NT System Admin Issues
Subject: OTish: Wireless network configuration

All,

We've got a decent wireless network at $WORK, but I'm dissatisified with it, 
because it lacks good guest access.

We have 18 Cisco 1240ag WAPs talking with 3 HP POE switches, which currently 
are in our HP 3400cl layer 3 switch on our production network. There's a single 
SSID across all of them, and I've got them all configured on a single VLAN. 
Works great, but as mentioned there is no guest access.

I could just stick them all physically outside our firewall, and give the 
wireless users an IPSec VPN client, but I really would prefer not to do that.

I've been doing some reading, but don't have a good handle on how to move to a 
configuration that would work well - without the VPN, that is.

I'm casting about for ideas - anyone have a solution they like?
Preferably without spending tons of money, of course.

Kurt

~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ 
<http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ 
<http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~


~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ 
<http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to