RE: Guest network security

2013-02-06 Thread Jim Holmgren
I did that at my previous gig.  

I also printed tent cards up and placed them in all of the conference rooms, 
where company guests tend to gather.  We changed the pwd every 90 days and just 
printed new cards.   

It worked well for me with no complaints.

Jim


Jim Holmgren
Director of Technology Infrastructure
Benefits Operations
United Healthcare
The Warehouse at Camden Yards
351 West Camden Street, Suite 100
Baltimore, MD 21201 
410.625.2200 (main)
443.524.8573 (direct)
443-506.2400 (cell)


-Original Message-
From: Kurt Buff [mailto:kurt.b...@gmail.com] 
Sent: Wednesday, February 06, 2013 2:36 PM
To: NT System Admin Issues
Subject: OT: Guest network security

All,

Quite some time ago, I set up an unsecured guest VLAN in our network, providing 
wireless access to all of the sundry devices that staff and visitors carry. I 
set up a small FreeBSD machine to serve IP addresses via DHCP, and that was 
dead simple.

It is a layer2 VLAN, traversing our backbone, and terminating on our corporate 
firewall.

However, there are now other tenants in our building, and the subnet is getting 
too much bandwidth and address consumption - the range I set up is completely 
filled, and the VLAN is consuming about half of our Internet pipe, which is far 
too much for my comfort.

I suspect the other tenants are leeching.

What I've read of captive portals seems to indicate that the portal is part of 
the firewall. I could be wrong about that, though. Regardless, the corporate 
firewall will not be allowed to be part of this solution.

The only other alternative I see right now is to set up a password on the SSID, 
and have the front desk hand it out to guests, after mailing it to staff, and 
I'm getting pushback on that from my manager.

Does anyone have some ideas I could pursue on this?

Thanks,

Kurt

~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ 
http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


CONFIDENTIALITY NOTICE: This email, including attachments, is for the sole use 
of the intended recipient(s) and may contain confidential and/or protected 
health information. Under the Federal Law (HIPAA), the intended recipient is 
obligated to keep this information secure and confidential. Any disclosure to 
third parties without authorization from the affiliate or as permitted by law 
is prohibited and punishable under Federal Law. If you are not the intended 
recipient, please contact the sender by reply e-mail and destroy all copies of 
the original message.

NOTA DE CONFIDENCIALIDAD: Este facsímile, incluyendo lo adjunto, es para el uso 
exclusivo del destinatario(s) y puede contener información confidencial y/o 
información protegida de salud. En virtud de la Ley Federal (HIPAA), el 
destinatario tiene la obligación de mantener esta información segura y 
confidencial. Cualquier divulgación a terceros sin la autorización de los 
miembros de lo permitido por la ley está prohibido y penado en virtud de la Ley 
Federal. Si usted no es el destinatario, por favor, póngase en contacto con el 
remitente por teléfono y destruir todas las copias del mensaje original
~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

RE: Guest network security

2013-02-06 Thread Guyer, Don
Might not solve the Internet pipe issue but, how about shortening the lease 
duration, to knock off inactive devices quicker?

Regards,

Don Guyer
Catholic Health East - Information Technology
Enterprise Directory  Messaging Services
3805 West Chester Pike, Suite 100, Newtown Square, Pa  19073
email: dgu...@che.org
Office:  610.550.3595 | Cell: 610.955.6528 | Fax: 610.271.9440
For immediate assistance, please open a Service Desk ticket or call the 
helpdesk @ 610-492-3839.



-Original Message-
From: Kurt Buff [mailto:kurt.b...@gmail.com] 
Sent: Wednesday, February 06, 2013 2:36 PM
To: NT System Admin Issues
Subject: OT: Guest network security

All,

Quite some time ago, I set up an unsecured guest VLAN in our network, providing 
wireless access to all of the sundry devices that staff and visitors carry. I 
set up a small FreeBSD machine to serve IP addresses via DHCP, and that was 
dead simple.

It is a layer2 VLAN, traversing our backbone, and terminating on our corporate 
firewall.

However, there are now other tenants in our building, and the subnet is getting 
too much bandwidth and address consumption - the range I set up is completely 
filled, and the VLAN is consuming about half of our Internet pipe, which is far 
too much for my comfort.

I suspect the other tenants are leeching.

What I've read of captive portals seems to indicate that the portal is part of 
the firewall. I could be wrong about that, though. Regardless, the corporate 
firewall will not be allowed to be part of this solution.

The only other alternative I see right now is to set up a password on the SSID, 
and have the front desk hand it out to guests, after mailing it to staff, and 
I'm getting pushback on that from my manager.

Does anyone have some ideas I could pursue on this?

Thanks,

Kurt

~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ 
http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Confidentiality Notice:
This e-mail, including any attachments is the
property of Catholic Health East and is intended
for the sole use of the intended recipient(s). 
It may contain information that is privileged and
confidential.  Any unauthorized review, use,
disclosure, or distribution is prohibited. If you are
not the intended recipient, please delete this message, and
reply to the sender regarding the error in a separate email.
 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

RE: Guest network security

2013-02-06 Thread Ziots, Edward
Kurt, 

Even with the password idea, you would have to rotate it daily if not weekly or 
someone will just leave it out where others can gain access. Honestly, anyone 
smart enough with AirCrack could get the password you put on the SSID. 

You could limit the DHCP scope to say 64 address and that might help limit the 
scope or number of people that can get on the Wireless network, or setup MAC 
filtering ( Again can bypass that with MAC Spoofing) but it would be a bit more 
manual process. 

I am thinking your idea about a portal process and authorization is probably 
the way to go, 

Z

Edward E. Ziots, CISSP, Security +, Network +
Security Engineer
Lifespan Organization
ezi...@lifespan.org

This electronic message and any attachments may be privileged and confidential 
and protected from disclosure. If you are reading this message, but are not the 
intended recipient, nor an employee or agent responsible for delivering this 
message to the intended recipient, you are hereby notified that you are 
strictly prohibited from copying, printing, forwarding or otherwise 
disseminating this communication. If you have received this communication in 
error, please immediately notify the sender by replying to the message. Then, 
delete the message from your computer. Thank you.




-Original Message-
From: Kurt Buff [mailto:kurt.b...@gmail.com] 
Sent: Wednesday, February 06, 2013 2:36 PM
To: NT System Admin Issues
Subject: OT: Guest network security

All,

Quite some time ago, I set up an unsecured guest VLAN in our network, providing 
wireless access to all of the sundry devices that staff and visitors carry. I 
set up a small FreeBSD machine to serve IP addresses via DHCP, and that was 
dead simple.

It is a layer2 VLAN, traversing our backbone, and terminating on our corporate 
firewall.

However, there are now other tenants in our building, and the subnet is getting 
too much bandwidth and address consumption - the range I set up is completely 
filled, and the VLAN is consuming about half of our Internet pipe, which is far 
too much for my comfort.

I suspect the other tenants are leeching.

What I've read of captive portals seems to indicate that the portal is part of 
the firewall. I could be wrong about that, though. Regardless, the corporate 
firewall will not be allowed to be part of this solution.

The only other alternative I see right now is to set up a password on the SSID, 
and have the front desk hand it out to guests, after mailing it to staff, and 
I'm getting pushback on that from my manager.

Does anyone have some ideas I could pursue on this?

Thanks,

Kurt

~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ 
http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Re: Guest network security

2013-02-06 Thread Kurt Buff
Lease time is already at 4 hours, so I don't think that's our issue.

On Wed, Feb 6, 2013 at 11:47 AM, Guyer, Don dgu...@che.org wrote:
 Might not solve the Internet pipe issue but, how about shortening the lease 
 duration, to knock off inactive devices quicker?

 Regards,

 Don Guyer
 Catholic Health East - Information Technology
 Enterprise Directory  Messaging Services
 3805 West Chester Pike, Suite 100, Newtown Square, Pa  19073
 email: dgu...@che.org
 Office:  610.550.3595 | Cell: 610.955.6528 | Fax: 610.271.9440
 For immediate assistance, please open a Service Desk ticket or call the 
 helpdesk @ 610-492-3839.



 -Original Message-
 From: Kurt Buff [mailto:kurt.b...@gmail.com]
 Sent: Wednesday, February 06, 2013 2:36 PM
 To: NT System Admin Issues
 Subject: OT: Guest network security

 All,

 Quite some time ago, I set up an unsecured guest VLAN in our network, 
 providing wireless access to all of the sundry devices that staff and 
 visitors carry. I set up a small FreeBSD machine to serve IP addresses via 
 DHCP, and that was dead simple.

 It is a layer2 VLAN, traversing our backbone, and terminating on our 
 corporate firewall.

 However, there are now other tenants in our building, and the subnet is 
 getting too much bandwidth and address consumption - the range I set up is 
 completely filled, and the VLAN is consuming about half of our Internet pipe, 
 which is far too much for my comfort.

 I suspect the other tenants are leeching.

 What I've read of captive portals seems to indicate that the portal is part 
 of the firewall. I could be wrong about that, though. Regardless, the 
 corporate firewall will not be allowed to be part of this solution.

 The only other alternative I see right now is to set up a password on the 
 SSID, and have the front desk hand it out to guests, after mailing it to 
 staff, and I'm getting pushback on that from my manager.

 Does anyone have some ideas I could pursue on this?

 Thanks,

 Kurt

 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ 
 http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

 ---
 To manage subscriptions click here: 
 http://lyris.sunbelt-software.com/read/my_forums/
 or send an email to listmana...@lyris.sunbeltsoftware.com
 with the body: unsubscribe ntsysadmin

 Confidentiality Notice:
 This e-mail, including any attachments is the
 property of Catholic Health East and is intended
 for the sole use of the intended recipient(s).
 It may contain information that is privileged and
 confidential.  Any unauthorized review, use,
 disclosure, or distribution is prohibited. If you are
 not the intended recipient, please delete this message, and
 reply to the sender regarding the error in a separate email.


 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
 ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

 ---
 To manage subscriptions click here: 
 http://lyris.sunbelt-software.com/read/my_forums/
 or send an email to listmana...@lyris.sunbeltsoftware.com
 with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin



Re: Guest network security

2013-02-06 Thread Kurt Buff
While it's possible that someone will crack the password and
distribute it, I think it's a reasonable first step - simpler than
putting up a captive portal.

And, if it doesn't work, the captive portal can be done later.

I'll definitely be looking at that.

Kurt

On Wed, Feb 6, 2013 at 11:49 AM, Ziots, Edward ezi...@lifespan.org wrote:
 Kurt,

 Even with the password idea, you would have to rotate it daily if not weekly 
 or someone will just leave it out where others can gain access. Honestly, 
 anyone smart enough with AirCrack could get the password you put on the SSID.

 You could limit the DHCP scope to say 64 address and that might help limit 
 the scope or number of people that can get on the Wireless network, or setup 
 MAC filtering ( Again can bypass that with MAC Spoofing) but it would be a 
 bit more manual process.

 I am thinking your idea about a portal process and authorization is probably 
 the way to go,

 Z

 Edward E. Ziots, CISSP, Security +, Network +
 Security Engineer
 Lifespan Organization
 ezi...@lifespan.org

 This electronic message and any attachments may be privileged and 
 confidential and protected from disclosure. If you are reading this message, 
 but are not the intended recipient, nor an employee or agent responsible for 
 delivering this message to the intended recipient, you are hereby notified 
 that you are strictly prohibited from copying, printing, forwarding or 
 otherwise disseminating this communication. If you have received this 
 communication in error, please immediately notify the sender by replying to 
 the message. Then, delete the message from your computer. Thank you.




 -Original Message-
 From: Kurt Buff [mailto:kurt.b...@gmail.com]
 Sent: Wednesday, February 06, 2013 2:36 PM
 To: NT System Admin Issues
 Subject: OT: Guest network security

 All,

 Quite some time ago, I set up an unsecured guest VLAN in our network, 
 providing wireless access to all of the sundry devices that staff and 
 visitors carry. I set up a small FreeBSD machine to serve IP addresses via 
 DHCP, and that was dead simple.

 It is a layer2 VLAN, traversing our backbone, and terminating on our 
 corporate firewall.

 However, there are now other tenants in our building, and the subnet is 
 getting too much bandwidth and address consumption - the range I set up is 
 completely filled, and the VLAN is consuming about half of our Internet pipe, 
 which is far too much for my comfort.

 I suspect the other tenants are leeching.

 What I've read of captive portals seems to indicate that the portal is part 
 of the firewall. I could be wrong about that, though. Regardless, the 
 corporate firewall will not be allowed to be part of this solution.

 The only other alternative I see right now is to set up a password on the 
 SSID, and have the front desk hand it out to guests, after mailing it to 
 staff, and I'm getting pushback on that from my manager.

 Does anyone have some ideas I could pursue on this?

 Thanks,

 Kurt

 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ 
 http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

 ---
 To manage subscriptions click here: 
 http://lyris.sunbelt-software.com/read/my_forums/
 or send an email to listmana...@lyris.sunbeltsoftware.com
 with the body: unsubscribe ntsysadmin


 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
 ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

 ---
 To manage subscriptions click here: 
 http://lyris.sunbelt-software.com/read/my_forums/
 or send an email to listmana...@lyris.sunbeltsoftware.com
 with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin



Re: Guest network security

2013-02-06 Thread Kurt Buff
This looks reasonable.

I brought up the filled lease table, and that got my manager's
attention, so I've gotten permission to do this.

Kurt

On Wed, Feb 6, 2013 at 11:44 AM, Jim Holmgren jholmg...@xlhealth.com wrote:
 I did that at my previous gig.

 I also printed tent cards up and placed them in all of the conference rooms, 
 where company guests tend to gather.  We changed the pwd every 90 days and 
 just printed new cards.

 It worked well for me with no complaints.

 Jim


 Jim Holmgren
 Director of Technology Infrastructure
 Benefits Operations
 United Healthcare
 The Warehouse at Camden Yards
 351 West Camden Street, Suite 100
 Baltimore, MD 21201
 410.625.2200 (main)
 443.524.8573 (direct)
 443-506.2400 (cell)


 -Original Message-
 From: Kurt Buff [mailto:kurt.b...@gmail.com]
 Sent: Wednesday, February 06, 2013 2:36 PM
 To: NT System Admin Issues
 Subject: OT: Guest network security

 All,

 Quite some time ago, I set up an unsecured guest VLAN in our network, 
 providing wireless access to all of the sundry devices that staff and 
 visitors carry. I set up a small FreeBSD machine to serve IP addresses via 
 DHCP, and that was dead simple.

 It is a layer2 VLAN, traversing our backbone, and terminating on our 
 corporate firewall.

 However, there are now other tenants in our building, and the subnet is 
 getting too much bandwidth and address consumption - the range I set up is 
 completely filled, and the VLAN is consuming about half of our Internet pipe, 
 which is far too much for my comfort.

 I suspect the other tenants are leeching.

 What I've read of captive portals seems to indicate that the portal is part 
 of the firewall. I could be wrong about that, though. Regardless, the 
 corporate firewall will not be allowed to be part of this solution.

 The only other alternative I see right now is to set up a password on the 
 SSID, and have the front desk hand it out to guests, after mailing it to 
 staff, and I'm getting pushback on that from my manager.

 Does anyone have some ideas I could pursue on this?

 Thanks,

 Kurt

 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ 
 http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

 ---
 To manage subscriptions click here: 
 http://lyris.sunbelt-software.com/read/my_forums/
 or send an email to listmana...@lyris.sunbeltsoftware.com
 with the body: unsubscribe ntsysadmin


 CONFIDENTIALITY NOTICE: This email, including attachments, is for the sole 
 use of the intended recipient(s) and may contain confidential and/or 
 protected health information. Under the Federal Law (HIPAA), the intended 
 recipient is obligated to keep this information secure and confidential. Any 
 disclosure to third parties without authorization from the affiliate or as 
 permitted by law is prohibited and punishable under Federal Law. If you are 
 not the intended recipient, please contact the sender by reply e-mail and 
 destroy all copies of the original message.

 NOTA DE CONFIDENCIALIDAD: Este facsímile, incluyendo lo adjunto, es para el 
 uso exclusivo del destinatario(s) y puede contener información confidencial 
 y/o información protegida de salud. En virtud de la Ley Federal (HIPAA), el 
 destinatario tiene la obligación de mantener esta información segura y 
 confidencial. Cualquier divulgación a terceros sin la autorización de los 
 miembros de lo permitido por la ley está prohibido y penado en virtud de la 
 Ley Federal. Si usted no es el destinatario, por favor, póngase en contacto 
 con el remitente por teléfono y destruir todas las copias del mensaje original
 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
 ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

 ---
 To manage subscriptions click here: 
 http://lyris.sunbelt-software.com/read/my_forums/
 or send an email to listmana...@lyris.sunbeltsoftware.com
 with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin



RE: Guest network security

2013-02-06 Thread Guyer, Don
Might be good to drop down to 2 hours. At one of our locations, we went so far 
as 1 hour. Local support stated lots of people come in and connect tablets just 
to print out stuff, then leave.

It's always something...

: )

Regards,

Don Guyer
Catholic Health East - Information Technology
Enterprise Directory  Messaging Services
3805 West Chester Pike, Suite 100, Newtown Square, Pa  19073
email: dgu...@che.org
Office:  610.550.3595 | Cell: 610.955.6528 | Fax: 610.271.9440
For immediate assistance, please open a Service Desk ticket or call the 
helpdesk @ 610-492-3839.



-Original Message-
From: Kurt Buff [mailto:kurt.b...@gmail.com] 
Sent: Wednesday, February 06, 2013 3:07 PM
To: NT System Admin Issues
Subject: Re: Guest network security

This looks reasonable.

I brought up the filled lease table, and that got my manager's attention, so 
I've gotten permission to do this.

Kurt

On Wed, Feb 6, 2013 at 11:44 AM, Jim Holmgren jholmg...@xlhealth.com wrote:
 I did that at my previous gig.

 I also printed tent cards up and placed them in all of the conference rooms, 
 where company guests tend to gather.  We changed the pwd every 90 days and 
 just printed new cards.

 It worked well for me with no complaints.

 Jim


 Jim Holmgren
 Director of Technology Infrastructure
 Benefits Operations
 United Healthcare
 The Warehouse at Camden Yards
 351 West Camden Street, Suite 100
 Baltimore, MD 21201
 410.625.2200 (main)
 443.524.8573 (direct)
 443-506.2400 (cell)


 -Original Message-
 From: Kurt Buff [mailto:kurt.b...@gmail.com]
 Sent: Wednesday, February 06, 2013 2:36 PM
 To: NT System Admin Issues
 Subject: OT: Guest network security

 All,

 Quite some time ago, I set up an unsecured guest VLAN in our network, 
 providing wireless access to all of the sundry devices that staff and 
 visitors carry. I set up a small FreeBSD machine to serve IP addresses via 
 DHCP, and that was dead simple.

 It is a layer2 VLAN, traversing our backbone, and terminating on our 
 corporate firewall.

 However, there are now other tenants in our building, and the subnet is 
 getting too much bandwidth and address consumption - the range I set up is 
 completely filled, and the VLAN is consuming about half of our Internet pipe, 
 which is far too much for my comfort.

 I suspect the other tenants are leeching.

 What I've read of captive portals seems to indicate that the portal is part 
 of the firewall. I could be wrong about that, though. Regardless, the 
 corporate firewall will not be allowed to be part of this solution.

 The only other alternative I see right now is to set up a password on the 
 SSID, and have the front desk hand it out to guests, after mailing it to 
 staff, and I'm getting pushback on that from my manager.

 Does anyone have some ideas I could pursue on this?

 Thanks,

 Kurt

 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ 
 http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

 ---
 To manage subscriptions click here: 
 http://lyris.sunbelt-software.com/read/my_forums/
 or send an email to listmana...@lyris.sunbeltsoftware.com
 with the body: unsubscribe ntsysadmin


 CONFIDENTIALITY NOTICE: This email, including attachments, is for the sole 
 use of the intended recipient(s) and may contain confidential and/or 
 protected health information. Under the Federal Law (HIPAA), the intended 
 recipient is obligated to keep this information secure and confidential. Any 
 disclosure to third parties without authorization from the affiliate or as 
 permitted by law is prohibited and punishable under Federal Law. If you are 
 not the intended recipient, please contact the sender by reply e-mail and 
 destroy all copies of the original message.

 NOTA DE CONFIDENCIALIDAD: Este facsímile, incluyendo lo adjunto, es 
 para el uso exclusivo del destinatario(s) y puede contener información 
 confidencial y/o información protegida de salud. En virtud de la Ley 
 Federal (HIPAA), el destinatario tiene la obligación de mantener esta 
 información segura y confidencial. Cualquier divulgación a terceros 
 sin la autorización de los miembros de lo permitido por la ley está 
 prohibido y penado en virtud de la Ley Federal. Si usted no es el 
 destinatario, por favor, póngase en contacto con el remitente por 
 teléfono y destruir todas las copias del mensaje original ~ Finally, 
 powerful endpoint security that ISN'T a resource hog! ~ ~ 
 http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

 ---
 To manage subscriptions click here: 
 http://lyris.sunbelt-software.com/read/my_forums/
 or send an email to listmana...@lyris.sunbeltsoftware.com
 with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ 
http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body

RE: Guest network security

2013-02-06 Thread Jon Harris

Would not MAC filtering be a bit intensive for what he wants?  If you could 
reverse filter that would be the way to go. Jon
  From: ezi...@lifespan.org
 To: ntsysadmin@lyris.sunbelt-software.com
 Subject: RE: Guest network security
 Date: Wed, 6 Feb 2013 19:49:23 +
 
 Kurt, 
 
 Even with the password idea, you would have to rotate it daily if not weekly 
 or someone will just leave it out where others can gain access. Honestly, 
 anyone smart enough with AirCrack could get the password you put on the SSID. 
 
 You could limit the DHCP scope to say 64 address and that might help limit 
 the scope or number of people that can get on the Wireless network, or setup 
 MAC filtering ( Again can bypass that with MAC Spoofing) but it would be a 
 bit more manual process. 
 
 I am thinking your idea about a portal process and authorization is probably 
 the way to go, 
 
 Z
 
 Edward E. Ziots, CISSP, Security +, Network +
 Security Engineer
 Lifespan Organization
 ezi...@lifespan.org
 
 This electronic message and any attachments may be privileged and 
 confidential and protected from disclosure. If you are reading this message, 
 but are not the intended recipient, nor an employee or agent responsible for 
 delivering this message to the intended recipient, you are hereby notified 
 that you are strictly prohibited from copying, printing, forwarding or 
 otherwise disseminating this communication. If you have received this 
 communication in error, please immediately notify the sender by replying to 
 the message. Then, delete the message from your computer. Thank you.
 
 
 
 
 -Original Message-
 From: Kurt Buff [mailto:kurt.b...@gmail.com] 
 Sent: Wednesday, February 06, 2013 2:36 PM
 To: NT System Admin Issues
 Subject: OT: Guest network security
 
 All,
 
 Quite some time ago, I set up an unsecured guest VLAN in our network, 
 providing wireless access to all of the sundry devices that staff and 
 visitors carry. I set up a small FreeBSD machine to serve IP addresses via 
 DHCP, and that was dead simple.
 
 It is a layer2 VLAN, traversing our backbone, and terminating on our 
 corporate firewall.
 
 However, there are now other tenants in our building, and the subnet is 
 getting too much bandwidth and address consumption - the range I set up is 
 completely filled, and the VLAN is consuming about half of our Internet pipe, 
 which is far too much for my comfort.
 
 I suspect the other tenants are leeching.
 
 What I've read of captive portals seems to indicate that the portal is part 
 of the firewall. I could be wrong about that, though. Regardless, the 
 corporate firewall will not be allowed to be part of this solution.
 
 The only other alternative I see right now is to set up a password on the 
 SSID, and have the front desk hand it out to guests, after mailing it to 
 staff, and I'm getting pushback on that from my manager.
 
 Does anyone have some ideas I could pursue on this?
 
 Thanks,
 
 Kurt
 
 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ 
 http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~
 
 ---
 To manage subscriptions click here: 
 http://lyris.sunbelt-software.com/read/my_forums/
 or send an email to listmana...@lyris.sunbeltsoftware.com
 with the body: unsubscribe ntsysadmin
 
 
 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
 ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~
 
 ---
 To manage subscriptions click here: 
 http://lyris.sunbelt-software.com/read/my_forums/
 or send an email to listmana...@lyris.sunbeltsoftware.com
 with the body: unsubscribe ntsysadmin
  
~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin