Issues with Zoom in Res Halls

2021-01-22 Thread Charles Rumford

Hey -

We have started getting reports of issues with Zoom calls in our Res Halls. Most 
of the complaints have been around multiple drops during calls or lagging calls. 
Our res halls are currently only at 40-50% capacity if that.


I was curious if anyone else has been seeing any issues with an increase of Zoom 
calls from on campus students.



--
Charles Rumford (he/his/him)
IT Architect
ISC Tech Services
University of Pennsylvania
OpenPGP Key ID: 0xF3D8215A

**
Replies to EDUCAUSE Community Group emails are sent to the entire community 
list. If you want to reply only to the person who sent the message, copy and 
paste their email address and forward the email reply. Additional participation 
and subscription information can be found at https://www.educause.edu/community


Re: [WIRELESS-LAN] Issues with Windows 10

2018-07-31 Thread Charles Rumford
On 07/31/2018 04:18 PM, Michael Dickson wrote:
> Hi Charles,
> 
> 
> What do you mean by "we ended up configuring all of the intermediate certs"? 
> Do
> you mean you are now pushing all certs down to the client during the JoinNow
> process?

Yes. We ended up, just for Windows, pushing all of certs down to the clients. It
was the only way we could get the profile to work.

> 
> 
> We are also running EAP-TTLS/PAP with JoinNow with a cross-signed double
> intermediate cert. I haven't heard of any issues yet but want to get in front 
> of
> any that might crop up..
> 
> 
> Thanks,
> Mike
> 
> Michael Dickson
> Network Engineer
> Information Technology
> University of Massachusetts Amherst
> 413-545-9639
> michael.dick...@umass.edu
> PGP: 0x16777D39
> 
> 
> 
> --------
> *From:* The EDUCAUSE Wireless Issues Constituent Group Listserv
>  on behalf of Charles Rumford
> 
> *Sent:* Tuesday, July 31, 2018 12:24 PM
> *To:* WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
> *Subject:* Re: [WIRELESS-LAN] Issues with Windows 10
>  
> On 07/30/2018 01:09 PM, Turner, Ryan H wrote:
>> From SecureW2:
>> 
>> The issue is noticed when the RADIUS server cert is signed by AddTrust 
>> External CA Root (Cross signed by USERTrust RSA Certification Authority) and 
>> with the recent windows 10 update. We are looking into this and should be 
>> able to provide you an update.
>> 
> 
> We ended up configuring all of the intermediate certs, and it solved the 
> problem.
> 
> 
> -- 
> Charles Rumford
> Senior Network Engineer
> ISC Tech Services
> University of Pennsylvania
> OpenPGP Key ID: 0x173F5F3A (2018/07/05)
> 
> 
> **
> Participation and subscription information for this EDUCAUSE Constituent Group
> discussion list can be found at http://www.educause.edu/discuss.
> 
> ** Participation and subscription information for this EDUCAUSE
> Constituent Group discussion list can be found at 
> http://www.educause.edu/discuss.
> 


-- 
Charles Rumford
Senior Network Engineer
ISC Tech Services
University of Pennsylvania
OpenPGP Key ID: 0x173F5F3A (2018/07/05)

**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/discuss.


Re: [WIRELESS-LAN] Issues with Windows 10

2018-07-31 Thread Charles Rumford
On 07/30/2018 01:09 PM, Turner, Ryan H wrote:
> From SecureW2:
> 
> The issue is noticed when the RADIUS server cert is signed by AddTrust 
> External CA Root (Cross signed by USERTrust RSA Certification Authority) and 
> with the recent windows 10 update. We are looking into this and should be 
> able to provide you an update.
> 

We ended up configuring all of the intermediate certs, and it solved the 
problem.


-- 
Charles Rumford
Senior Network Engineer
ISC Tech Services
University of Pennsylvania
OpenPGP Key ID: 0x173F5F3A (2018/07/05)


**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/discuss.



signature.asc
Description: OpenPGP digital signature


Re: [WIRELESS-LAN] Issues with Windows 10

2018-07-30 Thread Charles Rumford
On 07/30/2018 11:22 AM, Turner, Ryan H wrote:
> We aren't running your method, but we also haven't heard of any mass scale
> issues (doesn't mean there isn't).  What did SecureW2 say?


They are telling us that it's an issue with our cert stack, which I'm having a
hard time believing.

We have a call with them this afternoon to try and figure it out before we
deploy in the morning.


-- 
Charles Rumford
Senior Network Engineer
ISC Tech Services
University of Pennsylvania
OpenPGP Key ID: 0x173F5F3A (2018/07/05)


**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/discuss.



signature.asc
Description: OpenPGP digital signature


Issues with Windows 10

2018-07-30 Thread Charles Rumford
Good morning everyone -

We here at Penn have recently come across a strange issue with Windows 10 and
our new JoinNow installation.

The run down goes like this:

  1) Connect to onboarding SSID
  2) Run JoinNow
  3) Authentication Loop on Windows 10

Doing some research into it, there are a couple of things we noticed:

  a) If we turn off server validation, the Windows 10 device connects fine.
  b) looking at a packet trace, the device just stops responding to the RADIUS
 server after the server cert has been pasted to the client.
  c) we have to re-install the wireless driver on the device to be able to get
 the device working again.
  d) Our old CloudPath installation appears to be resulting in the same thing.

We are running EAP-TTLS/EAP-PAP here.

I was curious if anyone else was seeing issues with Windows 10 devices following
the latest patching from Microsoft.

-- 
Charles Rumford
Senior Network Engineer
ISC Tech Services
University of Pennsylvania
OpenPGP Key ID: 0x173F5F3A (2018/07/05)

**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/discuss.


Getting to the on-boarding Tool

2018-02-20 Thread Charles Rumford
We here at Penn are currently looking into different ways of getting our users
to our wireless on-boarding tool. We run to into a wide array of OS limitations,
 device inconsistencies, and end user stubbornness.

I was curious on what other schools were doing to get their users to a tool.
On-boarding SSIDs? Captive Portals? Redirections? I'm also curious what have
been some of your largest road-blocks and how you have gotten over them or at
least mitigated them.

Thanks!
-- 
Charles Rumford
Senior Network Engineer
ISC Tech Services
University of Pennsylvania
OpenPGP Key ID: 0xF3D8215A

**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/discuss.


Survey on Institution Guest Networking

2015-11-30 Thread Charles Rumford
Recently, the University of Pennsylvania set out looking into new
options for our guest network access. We are looking both into new
captive portal options along policies related to the guest network and
the guest network architecture.

Over the last couple of years, I have talked with a number engineers
from a number of different institutions regarding their guest networking
offerings and policies regarding guest traffic. While I have a lot of
word of mouth information, I thought having a formal survey would be a
good way to gather the information I'm interested in.

Please take 5-10 minutes and fill out the following survey:

https://upenn.co1.qualtrics.com/SE/?SID=SV_bmc4A1mogPmYTml

I will close the survey this Thursday (2015-12-03) and analyze the
responses. Once I have have all the results, I will email them out to
the different lists.

Thank you in advance for your help with collecting this information!


-- 
Charles Rumford
Network Engineer/Senior Wireless Engineer
ISC Network Operations
University of Pennsylvania
OpenPGP Key ID: 0xF3D8215A
(p) 215-746-2808


**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.



signature.asc
Description: OpenPGP digital signature


Re: [WIRELESS-LAN] Measuring RADIUS Auths

2015-10-19 Thread Charles Rumford
I ended up SNMP polling my Aruba controllers for their stat information.

As I don’t run our RADIUS systems, getting comparable stats from them is a bit 
challanging. The RADIUS server stats I have access to are in number of 
requests, where the Aruba MIB offers stats by complete auth.

You can see the results of the collection at [0], and if you are interest, the 
code is at [1].

[0] - http://drahtlos.dccs.upenn.edu/localhost/localhost/index.html#wireless
[1] - 
https://bitbucket.org/TallWireless/randomscripts/src/096bc66f00d1/auth-stats-poll/?at=master


> On Oct 19, 2015, at 10:51 AM, Matthew Newton <m...@leicester.ac.uk> wrote:
> 
> Hi Charles,
> 
> On Thu, Oct 15, 2015 at 09:08:33PM +, Charles Rumford wrote:
>> I’m currently embarking on a project to determine the number of
>> RADIUS auths per minute each one of my controllers is generating
>> to plan for the capacity I need for my RADIUS servers.
>> 
>> I was curious if anyone has embarked on a similar journey and
>> tried to measure auth rates coming from their controllers?
> 
> We feed our RADIUS logs into elasticsearch, which you can then
> query with kibana to get nice graphs of pretty much whatever you
> want from the logs, which of course includes requests, auth
> success, failures per second/minute, hour etc. We have several
> plots, one of which shows auths per sec for each controller in a
> stacked graph, as well as controller SNMP traps for RADIUS errors
> (so we can see when MSCHAP/Samba/AD is becoming overloaded...!).
> 
> I bundled the basic config for detail files into the FreeRADIUS
> source:
> 
>  
> https://github.com/FreeRADIUS/freeradius-server/tree/v3.0.x/doc/schemas/logstash
> 
> but that should work with any RADIUS server that writes out detail
> logs.
> 
> The only downside to this approach as it stands is that it stores
> complete logs, so you probably want to rotate them out after a few
> months for privacy reasons, so you then lose the graphs. I've not
> looked yet but it should be easy in logstash to output the stats
> as well to graphite or similar to keep the basic counters around
> for longer. But this "downside" is of course a great benefit when
> you want to search for logs, as the result is nearly
> instantaneous.
> 
> (Also feeding FreeRADIUS auth logs, Wireless Controller TRAPS and
> logs, and DHCP logs all in to the same elasticsearch index means
> you can get an excellent view across all your wireless logs when
> something goes wrong with a client.)
> 
> As you're using FreeRADIUS you can also use the "status" virtual
> server to get stats out - see sites-available/status. You drive it
> by feeding RADIUS packets into the server (e.g. with radclient) on
> the status port and it responds with the data. Examples in the
> server file. They can then be plotted with $GRAPHER_OF_CHOICE.
> 
> Cheers,
> 
> Matthew
> 
> 
> --
> Matthew Newton, Ph.D. <m...@le.ac.uk>
> 
> Systems Specialist, Infrastructure Services,
> I.T. Services, University of Leicester, Leicester LE1 7RH, United Kingdom
> 
> For IT help contact helpdesk extn. 2253, <ith...@le.ac.uk>
> 
> **
> Participation and subscription information for this EDUCAUSE Constituent 
> Group discussion list can be found at http://www.educause.edu/groups/.


Charles Rumford
Network Engineer/Senior Wireless Engineer
ISC Network Operations
University of Pennsylvania
OpenPGP Key ID: 0xF3D8215A
(p) 215-746-2808


**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.



signature.asc
Description: Message signed with OpenPGP using GPGMail


Re: [WIRELESS-LAN] Measuring RADIUS Auths

2015-10-16 Thread Charles Rumford
Is that raw requests or complete auths?

> On Oct 16, 2015, at 12:46 PM, Mattson III, Ken V. <kenmatt...@creighton.edu> 
> wrote:
> 
> We poll our controllers directly.
> 
> 
> 
> http://tools.cisco.com/Support/SNMP/do/BrowseOID.do?objectInput=1.3.6.1.4.1.14179.2.5.3.1.7=Translate=SUBMIT=true
> 
> 
> 
> We use the following OIDs:
> 
> 
> 
> 1.3.6.1.4.1.14179.2.5.3.1.7.3&1.3.6.1.4.1.14179.2.5.3.1.8.3
> 
> 
> 
> And graph them here:
> 
> 
> 
> http://mrtg.creighton.edu/WiSM/WiSM_Radius_Statistics.html
> 
> 
> 
> 
> 
> 
> 
> Kenneth V. Mattson III
> Director - Network and Data
> DoIT
> Creighton University
> 402-280-2743
> 402-981-1140
> 
> A password is like a toothbrush:
> Choose a good one, change it regularly and don't share it.
> 
> 
> 
> From: The EDUCAUSE Wireless Issues Constituent Group Listserv 
> [mailto:WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU] On Behalf Of Ciesinski, Nick
> Sent: Friday, October 16, 2015 10:20 AM
> To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
> Subject: Re: [WIRELESS-LAN] Measuring RADIUS Auths
> 
> 
> 
> This is the access key  AV3Q6TQB  I can’t add you for some reason.  Did you 
> ID change in CCW?
> 
> 
> 
> Nick
> 
> On Oct 16, 2015, at 10:11 AM, Walter Reynolds <wa...@umich.edu> wrote:
> 
> 
> 
> Since you mention in the thread that you have Cisco with Freeradius backend, 
> I thought I would point out that if you are request that show up in total 
> request.
> 
> 
> 
> That being said, our heaviest loaded Freeradius box seems to be hitting max 
> and we have hit as high as 150 auths/sec with an average of 80/sec over a 
> minute window.
> 
> 
> 
> Stand alone Two processor Quad core Intel Xeon X5570  @ 2.93GHz with 6Gb ram
> 
> 
> 
> A VM single Quad core with 8Gb ram seems to be peaking at 80/sec with a one 
> minute avg of 60/sec
> 
> 
> 
> 
> 
> 
> Walter Reynolds
> 
> Principal Systems Security Development Engineer
> Information and Technology Services
> University of Michigan
> (734) 615-9438
> 
> 
> 
> On Thu, Oct 15, 2015 at 5:08 PM, Charles Rumford <charl...@isc.upenn.edu> 
> wrote:
> 
> I’m currently embarking on a project to determine the number of RADIUS auths 
> per minute each one of my controllers is generating
> 
> I was curious if anyone has embarked on a similar journey and tried to 
> measure auth rates coming from their controllers?
> 
> I have a couple of ideas that I’m up for sharing, but I wanted to see if 
> anyone else has done this.
> 
> Thanks!
> 
> 
> Charles Rumford
> Network Engineer/Senior Wireless Engineer
> ISC Network Operations
> University of Pennsylvania
> OpenPGP Key ID: 0xF3D8215A
> (p) 215-746-2808
> 
> 
> **
> Participation and subscription information for this EDUCAUSE Constituent 
> Group discussion list can be found at http://www.educause.edu/groups/.
> 
> 
> 
> ** Participation and subscription information for this EDUCAUSE 
> Constituent Group discussion list can be found 
> athttp://www.educause.edu/groups/.
> 
> 
> 
> 
> 
> ** Participation and subscription information for this EDUCAUSE 
> Constituent Group discussion list can be found 
> athttp://www.educause.edu/groups/.
> 
> ** Participation and subscription information for this EDUCAUSE 
> Constituent Group discussion list can be found at 
> http://www.educause.edu/groups/.
> 


Charles Rumford
Network Engineer/Senior Wireless Engineer
ISC Network Operations
University of Pennsylvania
OpenPGP Key ID: 0xF3D8215A
(p) 215-746-2808


**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.



signature.asc
Description: Message signed with OpenPGP using GPGMail


Measuring RADIUS Auths

2015-10-15 Thread Charles Rumford
I’m currently embarking on a project to determine the number of RADIUS auths 
per minute each one of my controllers is generating to plan for the capacity I 
need for my RADIUS servers.

I was curious if anyone has embarked on a similar journey and tried to measure 
auth rates coming from their controllers?

I have a couple of ideas that I’m up for sharing, but I wanted to see if anyone 
else has done this.

Thanks!


Charles Rumford
Network Engineer/Senior Wireless Engineer
ISC Network Operations
University of Pennsylvania
OpenPGP Key ID: 0xF3D8215A
(p) 215-746-2808


**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.



signature.asc
Description: Message signed with OpenPGP using GPGMail


Re: [WIRELESS-LAN] Measuring RADIUS Auths

2015-10-15 Thread Charles Rumford
We are using FreeRADIUS, but I want to measure independent of the RADIUS server.

--
Charles Rumford
Network Engineer/Senior Wireless Engineer
ISC Network Operations
University of Pennsylvania
OpenPGP Key ID: 0xF3D8215A
(p) 215-746-2808

Sent from my phone

On Oct 15, 2015, at 17:12, Jeremy Gibbs 
<jlgi...@utica.edu<mailto:jlgi...@utica.edu>> wrote:

What are you using for a RADIUS server?


--

Jeremy L. Gibbs
Sr. Network Engineer
Utica College IITS

T: (315) 223-2383
F: (315) 792-3814
E: jlgi...@utica.edu<mailto:jlgi...@utica.edu>
http://www.utica.edu

On Thu, Oct 15, 2015 at 5:08 PM, Charles Rumford 
<charl...@isc.upenn.edu<mailto:charl...@isc.upenn.edu>> wrote:
I’m currently embarking on a project to determine the number of RADIUS auths 
per minute each one of my controllers is generating to plan for the capacity I 
need for my RADIUS servers.

I was curious if anyone has embarked on a similar journey and tried to measure 
auth rates coming from their controllers?

I have a couple of ideas that I’m up for sharing, but I wanted to see if anyone 
else has done this.

Thanks!


Charles Rumford
Network Engineer/Senior Wireless Engineer
ISC Network Operations
University of Pennsylvania
OpenPGP Key ID: 0xF3D8215A
(p) 215-746-2808


**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.


** Participation and subscription information for this EDUCAUSE 
Constituent Group discussion list can be found at 
http://www.educause.edu/groups/.

**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.



Re: [WIRELESS-LAN] Measuring RADIUS Auths

2015-10-15 Thread Charles Rumford
That is my first thought also. I might put two smaller boxes out on select 
controllers and do selective port mirroring from the actual controller to 
reduce the flood of traffic. More thinking and planning needed.

--
Charles Rumford
Network Engineer/Senior Wireless Engineer
ISC Network Operations
University of Pennsylvania
OpenPGP Key ID: 0xF3D8215A
(p) 215-746-2808

Sent from my phone

On Oct 15, 2015, at 17:29, Jeremy Gibbs 
<jlgi...@utica.edu<mailto:jlgi...@utica.edu>> wrote:

Hmm, I am interested to hear how you might accomplish that.  My first instinct 
is to port mirror the controller to a large enough box to handle the traffic 
and have a filter looking for port 1645/1812 (whatever your RADIUS AUTH port 
is) so you only capture that traffic (I would use tcpdump).  Then you might be 
able to do some stats on it if you capture for an hour or so.


--

Jeremy L. Gibbs
Sr. Network Engineer
Utica College IITS

T: (315) 223-2383
F: (315) 792-3814
E: jlgi...@utica.edu<mailto:jlgi...@utica.edu>
http://www.utica.edu

On Thu, Oct 15, 2015 at 5:13 PM, Charles Rumford 
<charl...@isc.upenn.edu<mailto:charl...@isc.upenn.edu>> wrote:
We are using FreeRADIUS, but I want to measure independent of the RADIUS server.

--
Charles Rumford
Network Engineer/Senior Wireless Engineer
ISC Network Operations
University of Pennsylvania
OpenPGP Key ID: 0xF3D8215A
(p) 215-746-2808

Sent from my phone

On Oct 15, 2015, at 17:12, Jeremy Gibbs 
<jlgi...@utica.edu<mailto:jlgi...@utica.edu>> wrote:

What are you using for a RADIUS server?


--

Jeremy L. Gibbs
Sr. Network Engineer
Utica College IITS

T: (315) 223-2383<tel:%28315%29%20223-2383>
F: (315) 792-3814<tel:%28315%29%20792-3814>
E: jlgi...@utica.edu<mailto:jlgi...@utica.edu>
http://www.utica.edu

On Thu, Oct 15, 2015 at 5:08 PM, Charles Rumford 
<charl...@isc.upenn.edu<mailto:charl...@isc.upenn.edu>> wrote:
I’m currently embarking on a project to determine the number of RADIUS auths 
per minute each one of my controllers is generating to plan for the capacity I 
need for my RADIUS servers.

I was curious if anyone has embarked on a similar journey and tried to measure 
auth rates coming from their controllers?

I have a couple of ideas that I’m up for sharing, but I wanted to see if anyone 
else has done this.

Thanks!


Charles Rumford
Network Engineer/Senior Wireless Engineer
ISC Network Operations
University of Pennsylvania
OpenPGP Key ID: 0xF3D8215A
(p) 215-746-2808


**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.


** Participation and subscription information for this EDUCAUSE 
Constituent Group discussion list can be found at 
http://www.educause.edu/groups/.

** Participation and subscription information for this EDUCAUSE 
Constituent Group discussion list can be found at 
http://www.educause.edu/groups/.

** Participation and subscription information for this EDUCAUSE 
Constituent Group discussion list can be found at 
http://www.educause.edu/groups/.

**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.



Problems with new Apple Laptops

2013-06-20 Thread Charles Rumford
I've started to see rumors of wireless connection issues with refreshed Apple 
laptops. As most of you know, Apple included AC cards in the MacBooks with this 
refresh.

I was curious if anyone has seen any trouble with the brand new MacBooks. If 
there are problems, I'd like to start squashing them, and potentially putting 
pressure on Apple before the new school year starts.



Charles Rumford
Network Engineer
ISC Network Operations
University of Pennsylvania
(p) 215-746-2808
(c) 267-398-7939

**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.


RE: [WIRELESS-LAN] PEAP cert signed by 3rd party CA

2012-12-11 Thread Charles Rumford
I've used InCommon before with success.

Have you tried just a normal VeriSign cert and not the specialized one?


Sent from my Android phone using TouchDown (www.nitrodesk.com)

-Original Message-
From: Hurt,Trenton W. [trent.h...@louisville.edu]
Received: Tuesday, 11 Dec 2012, 16:58
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU [WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU]
Subject: [WIRELESS-LAN] PEAP cert signed by 3rd party CA

What 3rd party CA’s are people using for their PEAP server side certificate?  I 
have previously used verisign because they have a specialized wlan radius cert 
that included the correct EKU’s for server authentication, 1.3.6.1.5.5.7.3.1.  
I cannot get the cert from verisign to work and I’m now looking at possibly 
changing CA’s.  My server requires the CSR be generated from the actual server 
itself, and it requires a .pem file and a private key file along with the 
private key passphrase when importing.

  Any suggestions, tips, tricks on this process is immensely appreciated.

Thanks
Trent


** Participation and subscription information for this EDUCAUSE 
Constituent Group discussion list can be found at 
http://www.educause.edu/groups/.

**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.



Re: [WIRELESS-LAN] wireless printers in dorms

2012-10-31 Thread Charles Rumford
Is anyone running a separate SSID just for these types of devices that don't do 
802.1X (printers, xbox, wii, nook, etc.)?

The previous institution that I was at had one of these that allowed students 
to connect these devices after registering the MAC address of the device. And 
Penn is currently in the process of testing different solutions to provide 
access to these kinds of devices.

-Charles

On Oct 31, 2012, at 8:21 AM, Lee H Badman lhbad...@syr.edu
 wrote:

 To me, this whole mess has a lot of contributing factors in the aggregate. 
 Lazy/dated/stuck-in-time client device makers, policy that is either lacking, 
 not enforced, or impossible to practically enforce, merchants (like campus 
 bookstores)not engaged or sympathetic to campus IT when it comes to getting 
 the message out about what works and doesn't in the dorms, and users that are 
 either hyper-clueless or hyper-savvy. Then there's the philosophical debates- 
 the dorm should be just like home, where people can do anything they want 
 versus the dorms are more like a hotel- you play by the rules of temporary 
 lodging etc. And the fact that we tend to have zero control over client 
 types, device health, and nuances like OS revisions and driver status per 
 client. Sprinkle in each WLAN vendor's bugs and quirks for good measure, as 
 standards-based WLAN is a bad joke these days from the antenna back.
 
 Put it all together, and one thing is certain- it's extremely difficult to 
 promise any kind of per-user bandwidth on even the best WLAN when the RF 
 environment is so variable, and there isn't enough staff in the world to run 
 around trying to squelch every bit of interference that pops up where you 
 have a large dorm environment.
 
 Happy sunny Wednesday, dagnammit.
 
 
 Love your show, 
 
 
 Curmudgeonly in Syracuse.
 
 
 
 Lee H. Badman
 Network Architect/Wireless TME
 Information Technology and Services (ITS)
 Syracuse University
 315 443-3003
  
  
 
 
 -Original Message-
 From: The EDUCAUSE Wireless Issues Constituent Group Listserv 
 [mailto:WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU] On Behalf Of Osborne, Bruce W
 Sent: Wednesday, October 31, 2012 7:44 AM
 To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
 Subject: Re: [WIRELESS-LAN] wireless printers in dorms
 
 Banning 2.4 GHz would ban a large portion of the consumer PCs and mobile 
 devices and all current game consoles. 
 
 I know that would not work here. We initially only offered IPTV on 5GHz n and 
 had to expand the offering to 2.4GHz due to complaints from students. 
 Excluding game consoles would also be a very big issue here.
 
 Bruce Osborne
 Network Engineer
 IT Network Services
  
 (434) 592-4229
  
 LIBERTY UNIVERSITY
 Training Champions for Christ since 1971
 
 -Original Message-
 From: Adam Forsyth [mailto:forsy...@luther.edu] 
 Sent: Tuesday, October 30, 2012 8:41 PM
 Subject: Re: wireless printers in dorms
 
 Has anyone declared 2.4Ghz hopeless and made a policy declaring that users 
 that want a working well performing wireless network connection need to make 
 arrangements to connect to the 5Ghz network?  If a policy like that could 
 fly, then it would be easier to run a 5Ghz network with great performance for 
 all of the laptops to connect to.  2.4Ghz could become a best effort waste 
 land polluted by all of the printers with their rogue ssid's, slowed down by 
 the wii's that insist on making 802.11B connections before they'll make 
 802.11G connections, interfered with by the bluetooth, wifi-direct, etc.
 
 Of course, I guess this is only a good idea until 5Ghz becomes the new 
 2.4Ghz.  I suppose it's probably only a matter of time until devices like 
 printers have dual band radios and can cause 5Ghz problems too.
 
 On Tue, Oct 30, 2012 at 2:36 PM, Tom O'Donnell to...@maine.edu wrote:
 I left out a couple factors... I don't know if the printers are 
 printing wirelessly, or that students even intend them to. They just 
 show up with wireless enabled, and whatever education we've done on 
 the subject doesn't seem to help.
 
 Sometimes we'll find a printer and the person has a USB cable. Nope, 
 I'm not using wireless on my printer, just the USB. But they don't 
 realize the wireless is on.
 
 We don't intend for them to work, at any rate. We prohibit it, but 
 going door to door hasn't worked completely. Word gets around the 
 dorms, and students hide their printers :)
 
 --
 Tom O'Donnell
 Senior Manager of Network and Server Systems Information Technology 
 Services University of Maine at Farmington
 (207) 778-7336
 
 
 On Tue, Oct 30, 2012 at 3:07 PM, Julian Y Koh kohs...@northwestern.edu 
 wrote:
 On Oct 30, 2012, at 13:53 , Tom O'Donnell to...@maine.edu
 wrote:
 
 I was wondering how other schools handle wireless printers in the 
 dorms.  This seems to be the year everyone showed up with one, and 
 they're causing connectivity problems in our 2.4GHz space.
 
 How well do the printers