Issues with Zoom in Res Halls
Hey - We have started getting reports of issues with Zoom calls in our Res Halls. Most of the complaints have been around multiple drops during calls or lagging calls. Our res halls are currently only at 40-50% capacity if that. I was curious if anyone else has been seeing any issues with an increase of Zoom calls from on campus students. -- Charles Rumford (he/his/him) IT Architect ISC Tech Services University of Pennsylvania OpenPGP Key ID: 0xF3D8215A ** Replies to EDUCAUSE Community Group emails are sent to the entire community list. If you want to reply only to the person who sent the message, copy and paste their email address and forward the email reply. Additional participation and subscription information can be found at https://www.educause.edu/community
Re: [WIRELESS-LAN] Issues with Windows 10
On 07/31/2018 04:18 PM, Michael Dickson wrote: > Hi Charles, > > > What do you mean by "we ended up configuring all of the intermediate certs"? > Do > you mean you are now pushing all certs down to the client during the JoinNow > process? Yes. We ended up, just for Windows, pushing all of certs down to the clients. It was the only way we could get the profile to work. > > > We are also running EAP-TTLS/PAP with JoinNow with a cross-signed double > intermediate cert. I haven't heard of any issues yet but want to get in front > of > any that might crop up.. > > > Thanks, > Mike > > Michael Dickson > Network Engineer > Information Technology > University of Massachusetts Amherst > 413-545-9639 > michael.dick...@umass.edu > PGP: 0x16777D39 > > > > -------- > *From:* The EDUCAUSE Wireless Issues Constituent Group Listserv > on behalf of Charles Rumford > > *Sent:* Tuesday, July 31, 2018 12:24 PM > *To:* WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU > *Subject:* Re: [WIRELESS-LAN] Issues with Windows 10 > > On 07/30/2018 01:09 PM, Turner, Ryan H wrote: >> From SecureW2: >> >> The issue is noticed when the RADIUS server cert is signed by AddTrust >> External CA Root (Cross signed by USERTrust RSA Certification Authority) and >> with the recent windows 10 update. We are looking into this and should be >> able to provide you an update. >> > > We ended up configuring all of the intermediate certs, and it solved the > problem. > > > -- > Charles Rumford > Senior Network Engineer > ISC Tech Services > University of Pennsylvania > OpenPGP Key ID: 0x173F5F3A (2018/07/05) > > > ** > Participation and subscription information for this EDUCAUSE Constituent Group > discussion list can be found at http://www.educause.edu/discuss. > > ** Participation and subscription information for this EDUCAUSE > Constituent Group discussion list can be found at > http://www.educause.edu/discuss. > -- Charles Rumford Senior Network Engineer ISC Tech Services University of Pennsylvania OpenPGP Key ID: 0x173F5F3A (2018/07/05) ** Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at http://www.educause.edu/discuss.
Re: [WIRELESS-LAN] Issues with Windows 10
On 07/30/2018 01:09 PM, Turner, Ryan H wrote: > From SecureW2: > > The issue is noticed when the RADIUS server cert is signed by AddTrust > External CA Root (Cross signed by USERTrust RSA Certification Authority) and > with the recent windows 10 update. We are looking into this and should be > able to provide you an update. > We ended up configuring all of the intermediate certs, and it solved the problem. -- Charles Rumford Senior Network Engineer ISC Tech Services University of Pennsylvania OpenPGP Key ID: 0x173F5F3A (2018/07/05) ** Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at http://www.educause.edu/discuss. signature.asc Description: OpenPGP digital signature
Re: [WIRELESS-LAN] Issues with Windows 10
On 07/30/2018 11:22 AM, Turner, Ryan H wrote: > We aren't running your method, but we also haven't heard of any mass scale > issues (doesn't mean there isn't). What did SecureW2 say? They are telling us that it's an issue with our cert stack, which I'm having a hard time believing. We have a call with them this afternoon to try and figure it out before we deploy in the morning. -- Charles Rumford Senior Network Engineer ISC Tech Services University of Pennsylvania OpenPGP Key ID: 0x173F5F3A (2018/07/05) ** Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at http://www.educause.edu/discuss. signature.asc Description: OpenPGP digital signature
Issues with Windows 10
Good morning everyone - We here at Penn have recently come across a strange issue with Windows 10 and our new JoinNow installation. The run down goes like this: 1) Connect to onboarding SSID 2) Run JoinNow 3) Authentication Loop on Windows 10 Doing some research into it, there are a couple of things we noticed: a) If we turn off server validation, the Windows 10 device connects fine. b) looking at a packet trace, the device just stops responding to the RADIUS server after the server cert has been pasted to the client. c) we have to re-install the wireless driver on the device to be able to get the device working again. d) Our old CloudPath installation appears to be resulting in the same thing. We are running EAP-TTLS/EAP-PAP here. I was curious if anyone else was seeing issues with Windows 10 devices following the latest patching from Microsoft. -- Charles Rumford Senior Network Engineer ISC Tech Services University of Pennsylvania OpenPGP Key ID: 0x173F5F3A (2018/07/05) ** Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at http://www.educause.edu/discuss.
Getting to the on-boarding Tool
We here at Penn are currently looking into different ways of getting our users to our wireless on-boarding tool. We run to into a wide array of OS limitations, device inconsistencies, and end user stubbornness. I was curious on what other schools were doing to get their users to a tool. On-boarding SSIDs? Captive Portals? Redirections? I'm also curious what have been some of your largest road-blocks and how you have gotten over them or at least mitigated them. Thanks! -- Charles Rumford Senior Network Engineer ISC Tech Services University of Pennsylvania OpenPGP Key ID: 0xF3D8215A ** Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at http://www.educause.edu/discuss.
Survey on Institution Guest Networking
Recently, the University of Pennsylvania set out looking into new options for our guest network access. We are looking both into new captive portal options along policies related to the guest network and the guest network architecture. Over the last couple of years, I have talked with a number engineers from a number of different institutions regarding their guest networking offerings and policies regarding guest traffic. While I have a lot of word of mouth information, I thought having a formal survey would be a good way to gather the information I'm interested in. Please take 5-10 minutes and fill out the following survey: https://upenn.co1.qualtrics.com/SE/?SID=SV_bmc4A1mogPmYTml I will close the survey this Thursday (2015-12-03) and analyze the responses. Once I have have all the results, I will email them out to the different lists. Thank you in advance for your help with collecting this information! -- Charles Rumford Network Engineer/Senior Wireless Engineer ISC Network Operations University of Pennsylvania OpenPGP Key ID: 0xF3D8215A (p) 215-746-2808 ** Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at http://www.educause.edu/groups/. signature.asc Description: OpenPGP digital signature
Re: [WIRELESS-LAN] Measuring RADIUS Auths
I ended up SNMP polling my Aruba controllers for their stat information. As I don’t run our RADIUS systems, getting comparable stats from them is a bit challanging. The RADIUS server stats I have access to are in number of requests, where the Aruba MIB offers stats by complete auth. You can see the results of the collection at [0], and if you are interest, the code is at [1]. [0] - http://drahtlos.dccs.upenn.edu/localhost/localhost/index.html#wireless [1] - https://bitbucket.org/TallWireless/randomscripts/src/096bc66f00d1/auth-stats-poll/?at=master > On Oct 19, 2015, at 10:51 AM, Matthew Newton <m...@leicester.ac.uk> wrote: > > Hi Charles, > > On Thu, Oct 15, 2015 at 09:08:33PM +, Charles Rumford wrote: >> I’m currently embarking on a project to determine the number of >> RADIUS auths per minute each one of my controllers is generating >> to plan for the capacity I need for my RADIUS servers. >> >> I was curious if anyone has embarked on a similar journey and >> tried to measure auth rates coming from their controllers? > > We feed our RADIUS logs into elasticsearch, which you can then > query with kibana to get nice graphs of pretty much whatever you > want from the logs, which of course includes requests, auth > success, failures per second/minute, hour etc. We have several > plots, one of which shows auths per sec for each controller in a > stacked graph, as well as controller SNMP traps for RADIUS errors > (so we can see when MSCHAP/Samba/AD is becoming overloaded...!). > > I bundled the basic config for detail files into the FreeRADIUS > source: > > > https://github.com/FreeRADIUS/freeradius-server/tree/v3.0.x/doc/schemas/logstash > > but that should work with any RADIUS server that writes out detail > logs. > > The only downside to this approach as it stands is that it stores > complete logs, so you probably want to rotate them out after a few > months for privacy reasons, so you then lose the graphs. I've not > looked yet but it should be easy in logstash to output the stats > as well to graphite or similar to keep the basic counters around > for longer. But this "downside" is of course a great benefit when > you want to search for logs, as the result is nearly > instantaneous. > > (Also feeding FreeRADIUS auth logs, Wireless Controller TRAPS and > logs, and DHCP logs all in to the same elasticsearch index means > you can get an excellent view across all your wireless logs when > something goes wrong with a client.) > > As you're using FreeRADIUS you can also use the "status" virtual > server to get stats out - see sites-available/status. You drive it > by feeding RADIUS packets into the server (e.g. with radclient) on > the status port and it responds with the data. Examples in the > server file. They can then be plotted with $GRAPHER_OF_CHOICE. > > Cheers, > > Matthew > > > -- > Matthew Newton, Ph.D. <m...@le.ac.uk> > > Systems Specialist, Infrastructure Services, > I.T. Services, University of Leicester, Leicester LE1 7RH, United Kingdom > > For IT help contact helpdesk extn. 2253, <ith...@le.ac.uk> > > ** > Participation and subscription information for this EDUCAUSE Constituent > Group discussion list can be found at http://www.educause.edu/groups/. Charles Rumford Network Engineer/Senior Wireless Engineer ISC Network Operations University of Pennsylvania OpenPGP Key ID: 0xF3D8215A (p) 215-746-2808 ** Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at http://www.educause.edu/groups/. signature.asc Description: Message signed with OpenPGP using GPGMail
Re: [WIRELESS-LAN] Measuring RADIUS Auths
Is that raw requests or complete auths? > On Oct 16, 2015, at 12:46 PM, Mattson III, Ken V. <kenmatt...@creighton.edu> > wrote: > > We poll our controllers directly. > > > > http://tools.cisco.com/Support/SNMP/do/BrowseOID.do?objectInput=1.3.6.1.4.1.14179.2.5.3.1.7=Translate=SUBMIT=true > > > > We use the following OIDs: > > > > 1.3.6.1.4.1.14179.2.5.3.1.7.3&1.3.6.1.4.1.14179.2.5.3.1.8.3 > > > > And graph them here: > > > > http://mrtg.creighton.edu/WiSM/WiSM_Radius_Statistics.html > > > > > > > > Kenneth V. Mattson III > Director - Network and Data > DoIT > Creighton University > 402-280-2743 > 402-981-1140 > > A password is like a toothbrush: > Choose a good one, change it regularly and don't share it. > > > > From: The EDUCAUSE Wireless Issues Constituent Group Listserv > [mailto:WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU] On Behalf Of Ciesinski, Nick > Sent: Friday, October 16, 2015 10:20 AM > To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU > Subject: Re: [WIRELESS-LAN] Measuring RADIUS Auths > > > > This is the access key AV3Q6TQB I can’t add you for some reason. Did you > ID change in CCW? > > > > Nick > > On Oct 16, 2015, at 10:11 AM, Walter Reynolds <wa...@umich.edu> wrote: > > > > Since you mention in the thread that you have Cisco with Freeradius backend, > I thought I would point out that if you are request that show up in total > request. > > > > That being said, our heaviest loaded Freeradius box seems to be hitting max > and we have hit as high as 150 auths/sec with an average of 80/sec over a > minute window. > > > > Stand alone Two processor Quad core Intel Xeon X5570 @ 2.93GHz with 6Gb ram > > > > A VM single Quad core with 8Gb ram seems to be peaking at 80/sec with a one > minute avg of 60/sec > > > > > > > Walter Reynolds > > Principal Systems Security Development Engineer > Information and Technology Services > University of Michigan > (734) 615-9438 > > > > On Thu, Oct 15, 2015 at 5:08 PM, Charles Rumford <charl...@isc.upenn.edu> > wrote: > > I’m currently embarking on a project to determine the number of RADIUS auths > per minute each one of my controllers is generating > > I was curious if anyone has embarked on a similar journey and tried to > measure auth rates coming from their controllers? > > I have a couple of ideas that I’m up for sharing, but I wanted to see if > anyone else has done this. > > Thanks! > > > Charles Rumford > Network Engineer/Senior Wireless Engineer > ISC Network Operations > University of Pennsylvania > OpenPGP Key ID: 0xF3D8215A > (p) 215-746-2808 > > > ** > Participation and subscription information for this EDUCAUSE Constituent > Group discussion list can be found at http://www.educause.edu/groups/. > > > > ** Participation and subscription information for this EDUCAUSE > Constituent Group discussion list can be found > athttp://www.educause.edu/groups/. > > > > > > ** Participation and subscription information for this EDUCAUSE > Constituent Group discussion list can be found > athttp://www.educause.edu/groups/. > > ** Participation and subscription information for this EDUCAUSE > Constituent Group discussion list can be found at > http://www.educause.edu/groups/. > Charles Rumford Network Engineer/Senior Wireless Engineer ISC Network Operations University of Pennsylvania OpenPGP Key ID: 0xF3D8215A (p) 215-746-2808 ** Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at http://www.educause.edu/groups/. signature.asc Description: Message signed with OpenPGP using GPGMail
Measuring RADIUS Auths
I’m currently embarking on a project to determine the number of RADIUS auths per minute each one of my controllers is generating to plan for the capacity I need for my RADIUS servers. I was curious if anyone has embarked on a similar journey and tried to measure auth rates coming from their controllers? I have a couple of ideas that I’m up for sharing, but I wanted to see if anyone else has done this. Thanks! Charles Rumford Network Engineer/Senior Wireless Engineer ISC Network Operations University of Pennsylvania OpenPGP Key ID: 0xF3D8215A (p) 215-746-2808 ** Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at http://www.educause.edu/groups/. signature.asc Description: Message signed with OpenPGP using GPGMail
Re: [WIRELESS-LAN] Measuring RADIUS Auths
We are using FreeRADIUS, but I want to measure independent of the RADIUS server. -- Charles Rumford Network Engineer/Senior Wireless Engineer ISC Network Operations University of Pennsylvania OpenPGP Key ID: 0xF3D8215A (p) 215-746-2808 Sent from my phone On Oct 15, 2015, at 17:12, Jeremy Gibbs <jlgi...@utica.edu<mailto:jlgi...@utica.edu>> wrote: What are you using for a RADIUS server? -- Jeremy L. Gibbs Sr. Network Engineer Utica College IITS T: (315) 223-2383 F: (315) 792-3814 E: jlgi...@utica.edu<mailto:jlgi...@utica.edu> http://www.utica.edu On Thu, Oct 15, 2015 at 5:08 PM, Charles Rumford <charl...@isc.upenn.edu<mailto:charl...@isc.upenn.edu>> wrote: I’m currently embarking on a project to determine the number of RADIUS auths per minute each one of my controllers is generating to plan for the capacity I need for my RADIUS servers. I was curious if anyone has embarked on a similar journey and tried to measure auth rates coming from their controllers? I have a couple of ideas that I’m up for sharing, but I wanted to see if anyone else has done this. Thanks! Charles Rumford Network Engineer/Senior Wireless Engineer ISC Network Operations University of Pennsylvania OpenPGP Key ID: 0xF3D8215A (p) 215-746-2808 ** Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at http://www.educause.edu/groups/. ** Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at http://www.educause.edu/groups/. ** Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at http://www.educause.edu/groups/.
Re: [WIRELESS-LAN] Measuring RADIUS Auths
That is my first thought also. I might put two smaller boxes out on select controllers and do selective port mirroring from the actual controller to reduce the flood of traffic. More thinking and planning needed. -- Charles Rumford Network Engineer/Senior Wireless Engineer ISC Network Operations University of Pennsylvania OpenPGP Key ID: 0xF3D8215A (p) 215-746-2808 Sent from my phone On Oct 15, 2015, at 17:29, Jeremy Gibbs <jlgi...@utica.edu<mailto:jlgi...@utica.edu>> wrote: Hmm, I am interested to hear how you might accomplish that. My first instinct is to port mirror the controller to a large enough box to handle the traffic and have a filter looking for port 1645/1812 (whatever your RADIUS AUTH port is) so you only capture that traffic (I would use tcpdump). Then you might be able to do some stats on it if you capture for an hour or so. -- Jeremy L. Gibbs Sr. Network Engineer Utica College IITS T: (315) 223-2383 F: (315) 792-3814 E: jlgi...@utica.edu<mailto:jlgi...@utica.edu> http://www.utica.edu On Thu, Oct 15, 2015 at 5:13 PM, Charles Rumford <charl...@isc.upenn.edu<mailto:charl...@isc.upenn.edu>> wrote: We are using FreeRADIUS, but I want to measure independent of the RADIUS server. -- Charles Rumford Network Engineer/Senior Wireless Engineer ISC Network Operations University of Pennsylvania OpenPGP Key ID: 0xF3D8215A (p) 215-746-2808 Sent from my phone On Oct 15, 2015, at 17:12, Jeremy Gibbs <jlgi...@utica.edu<mailto:jlgi...@utica.edu>> wrote: What are you using for a RADIUS server? -- Jeremy L. Gibbs Sr. Network Engineer Utica College IITS T: (315) 223-2383<tel:%28315%29%20223-2383> F: (315) 792-3814<tel:%28315%29%20792-3814> E: jlgi...@utica.edu<mailto:jlgi...@utica.edu> http://www.utica.edu On Thu, Oct 15, 2015 at 5:08 PM, Charles Rumford <charl...@isc.upenn.edu<mailto:charl...@isc.upenn.edu>> wrote: I’m currently embarking on a project to determine the number of RADIUS auths per minute each one of my controllers is generating to plan for the capacity I need for my RADIUS servers. I was curious if anyone has embarked on a similar journey and tried to measure auth rates coming from their controllers? I have a couple of ideas that I’m up for sharing, but I wanted to see if anyone else has done this. Thanks! Charles Rumford Network Engineer/Senior Wireless Engineer ISC Network Operations University of Pennsylvania OpenPGP Key ID: 0xF3D8215A (p) 215-746-2808 ** Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at http://www.educause.edu/groups/. ** Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at http://www.educause.edu/groups/. ** Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at http://www.educause.edu/groups/. ** Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at http://www.educause.edu/groups/. ** Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at http://www.educause.edu/groups/.
Problems with new Apple Laptops
I've started to see rumors of wireless connection issues with refreshed Apple laptops. As most of you know, Apple included AC cards in the MacBooks with this refresh. I was curious if anyone has seen any trouble with the brand new MacBooks. If there are problems, I'd like to start squashing them, and potentially putting pressure on Apple before the new school year starts. Charles Rumford Network Engineer ISC Network Operations University of Pennsylvania (p) 215-746-2808 (c) 267-398-7939 ** Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at http://www.educause.edu/groups/.
RE: [WIRELESS-LAN] PEAP cert signed by 3rd party CA
I've used InCommon before with success. Have you tried just a normal VeriSign cert and not the specialized one? Sent from my Android phone using TouchDown (www.nitrodesk.com) -Original Message- From: Hurt,Trenton W. [trent.h...@louisville.edu] Received: Tuesday, 11 Dec 2012, 16:58 To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU [WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU] Subject: [WIRELESS-LAN] PEAP cert signed by 3rd party CA What 3rd party CA’s are people using for their PEAP server side certificate? I have previously used verisign because they have a specialized wlan radius cert that included the correct EKU’s for server authentication, 1.3.6.1.5.5.7.3.1. I cannot get the cert from verisign to work and I’m now looking at possibly changing CA’s. My server requires the CSR be generated from the actual server itself, and it requires a .pem file and a private key file along with the private key passphrase when importing. Any suggestions, tips, tricks on this process is immensely appreciated. Thanks Trent ** Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at http://www.educause.edu/groups/. ** Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at http://www.educause.edu/groups/.
Re: [WIRELESS-LAN] wireless printers in dorms
Is anyone running a separate SSID just for these types of devices that don't do 802.1X (printers, xbox, wii, nook, etc.)? The previous institution that I was at had one of these that allowed students to connect these devices after registering the MAC address of the device. And Penn is currently in the process of testing different solutions to provide access to these kinds of devices. -Charles On Oct 31, 2012, at 8:21 AM, Lee H Badman lhbad...@syr.edu wrote: To me, this whole mess has a lot of contributing factors in the aggregate. Lazy/dated/stuck-in-time client device makers, policy that is either lacking, not enforced, or impossible to practically enforce, merchants (like campus bookstores)not engaged or sympathetic to campus IT when it comes to getting the message out about what works and doesn't in the dorms, and users that are either hyper-clueless or hyper-savvy. Then there's the philosophical debates- the dorm should be just like home, where people can do anything they want versus the dorms are more like a hotel- you play by the rules of temporary lodging etc. And the fact that we tend to have zero control over client types, device health, and nuances like OS revisions and driver status per client. Sprinkle in each WLAN vendor's bugs and quirks for good measure, as standards-based WLAN is a bad joke these days from the antenna back. Put it all together, and one thing is certain- it's extremely difficult to promise any kind of per-user bandwidth on even the best WLAN when the RF environment is so variable, and there isn't enough staff in the world to run around trying to squelch every bit of interference that pops up where you have a large dorm environment. Happy sunny Wednesday, dagnammit. Love your show, Curmudgeonly in Syracuse. Lee H. Badman Network Architect/Wireless TME Information Technology and Services (ITS) Syracuse University 315 443-3003 -Original Message- From: The EDUCAUSE Wireless Issues Constituent Group Listserv [mailto:WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU] On Behalf Of Osborne, Bruce W Sent: Wednesday, October 31, 2012 7:44 AM To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU Subject: Re: [WIRELESS-LAN] wireless printers in dorms Banning 2.4 GHz would ban a large portion of the consumer PCs and mobile devices and all current game consoles. I know that would not work here. We initially only offered IPTV on 5GHz n and had to expand the offering to 2.4GHz due to complaints from students. Excluding game consoles would also be a very big issue here. Bruce Osborne Network Engineer IT Network Services (434) 592-4229 LIBERTY UNIVERSITY Training Champions for Christ since 1971 -Original Message- From: Adam Forsyth [mailto:forsy...@luther.edu] Sent: Tuesday, October 30, 2012 8:41 PM Subject: Re: wireless printers in dorms Has anyone declared 2.4Ghz hopeless and made a policy declaring that users that want a working well performing wireless network connection need to make arrangements to connect to the 5Ghz network? If a policy like that could fly, then it would be easier to run a 5Ghz network with great performance for all of the laptops to connect to. 2.4Ghz could become a best effort waste land polluted by all of the printers with their rogue ssid's, slowed down by the wii's that insist on making 802.11B connections before they'll make 802.11G connections, interfered with by the bluetooth, wifi-direct, etc. Of course, I guess this is only a good idea until 5Ghz becomes the new 2.4Ghz. I suppose it's probably only a matter of time until devices like printers have dual band radios and can cause 5Ghz problems too. On Tue, Oct 30, 2012 at 2:36 PM, Tom O'Donnell to...@maine.edu wrote: I left out a couple factors... I don't know if the printers are printing wirelessly, or that students even intend them to. They just show up with wireless enabled, and whatever education we've done on the subject doesn't seem to help. Sometimes we'll find a printer and the person has a USB cable. Nope, I'm not using wireless on my printer, just the USB. But they don't realize the wireless is on. We don't intend for them to work, at any rate. We prohibit it, but going door to door hasn't worked completely. Word gets around the dorms, and students hide their printers :) -- Tom O'Donnell Senior Manager of Network and Server Systems Information Technology Services University of Maine at Farmington (207) 778-7336 On Tue, Oct 30, 2012 at 3:07 PM, Julian Y Koh kohs...@northwestern.edu wrote: On Oct 30, 2012, at 13:53 , Tom O'Donnell to...@maine.edu wrote: I was wondering how other schools handle wireless printers in the dorms. This seems to be the year everyone showed up with one, and they're causing connectivity problems in our 2.4GHz space. How well do the printers