...@lastar.com wrote:
You should provide specifics, instead of ambiguity.
Ambiguity helps no one, last I checked.
-Original Message-
From: Kurt Buff [mailto:kurt.b...@gmail.com]
Sent: Wednesday, June 09, 2010 4:50 PM
To: NT System Admin Issues
Subject: Re: OTish: Wireless
I'll definitely be reading this. I have HP switches, so it won't be
perfectly applicable, but its good info nonetheless.
On Wed, Jun 9, 2010 at 15:30, Phil Brutsche p...@optimumdata.com wrote:
In other words, this:
[mailto:kurt.b...@gmail.com]
Sent: Wednesday, June 09, 2010 4:50 PM
To: NT System Admin Issues
Subject: Re: OTish: Wireless network configuration
And more than that will be needed, as well.
On Wed, Jun 9, 2010 at 13:44, Phil Brutsche p...@optimumdata.com
wrote:
Or use Wireshark to make
On Sat, Jun 12, 2010 at 4:27 PM, Kurt Buff kurt.b...@gmail.com wrote:
I may have to find some outside HP help on this.
I believe HP has some tech notes on wireless and VLAN security on
their website.
If you want an introduction to the basics of VLANs with HP switches:
On Sat, Jun 12, 2010 at 14:10, Ben Scott mailvor...@gmail.com wrote:
On Sat, Jun 12, 2010 at 4:27 PM, Kurt Buff kurt.b...@gmail.com wrote:
I may have to find some outside HP help on this.
I believe HP has some tech notes on wireless and VLAN security on
their website.
If you want an
To: NT System Admin Issues
Subject: OTish: Wireless network configuration
All,
We've got a decent wireless network at $WORK, but I'm dissatisified with it,
because it lacks good guest access.
We have 18 Cisco 1240ag WAPs talking with 3 HP POE switches, which currently
are in our HP 3400cl layer 3
: OTish: Wireless network configuration
I wonder how you verify the security of such an arrangement?
On Tue, Jun 8, 2010 at 19:20, Joe Tinney jtin...@lastar.com wrote:
While I'm not the one that configured them, our Cisco wireless access points
are configured with two SSID's: one on a VLAN
intentional wardriving, there would be very few circumstances for casual
pedestrian access.
-Original Message-
From: Malcolm Reitz [mailto:malcolm.re...@live.com]
Sent: Wednesday, June 09, 2010 9:17 AM
To: NT System Admin Issues
Subject: RE: OTish: Wireless network configuration
Do you do
Does this solution not have any kind of captive portal? No add-ons or anything
available?
Cisco loves to sell add-ons don’t they?
-Original Message-
From: Kurt Buff [mailto:kurt.b...@gmail.com]
Sent: Tuesday, June 08, 2010 4:29 PM
To: NT System Admin Issues
Subject: OTish: Wireless
: Wireless network configuration
All,
We've got a decent wireless network at $WORK, but I'm dissatisified
with it, because it lacks good guest access.
We have 18 Cisco 1240ag WAPs talking with 3 HP POE switches, which
currently are in our HP 3400cl layer 3 switch on our production
network. There's
Message-
From: Kurt Buff [mailto:kurt.b...@gmail.com]
Sent: Tuesday, June 08, 2010 10:34 PM
To: NT System Admin Issues
Subject: Re: OTish: Wireless network configuration
I wonder how you verify the security of such an arrangement?
On Tue, Jun 8, 2010 at 19:20, Joe Tinney jtin
:
Does this solution not have any kind of captive portal? No add-ons or
anything available?
Cisco loves to sell add-ons don’t they?
-Original Message-
From: Kurt Buff [mailto:kurt.b...@gmail.com]
Sent: Tuesday, June 08, 2010 4:29 PM
To: NT System Admin Issues
Subject: OTish: Wireless
, June 09, 2010 2:18 PM
To: NT System Admin Issues
Subject: Re: OTish: Wireless network configuration
Understand that - how do you verify it that it works as designed?
On Wed, Jun 9, 2010 at 06:33, Joe Tinney jtin...@lastar.com wrote:
Access control and routing is done by our core firewall and router
segments
but I haven't done any scientific pen testing.
-Original Message-
From: Kurt Buff [mailto:kurt.b...@gmail.com]
Sent: Wednesday, June 09, 2010 2:18 PM
To: NT System Admin Issues
Subject: Re: OTish: Wireless network configuration
Understand that - how do you verify
You use NMAP to do network scans to determine what is accessible and what isn't.
-Original Message-
From: Joe Tinney [mailto:jtin...@lastar.com]
Sent: Wednesday, June 09, 2010 3:04 PM
To: NT System Admin Issues
Subject: RE: OTish: Wireless network configuration
I wasn't involved
Or use Wireshark to make sure you don't see traffic you shouldn't.
On 6/9/2010 3:41 PM, Jason Gauthier wrote:
You use NMAP to do network scans to determine what is accessible and what
isn't.
--
Phil Brutsche
p...@optimumdata.com
~ Finally, powerful endpoint security that ISN'T a resource
:04 PM
To: NT System Admin Issues
Subject: RE: OTish: Wireless network configuration
I wasn't involved in the implementation, so I really couldn't say how it was
done here. I know that I can't get to any of our 'protected' network segments
but I haven't done any scientific pen testing
And more than that will be needed, as well.
On Wed, Jun 9, 2010 at 13:44, Phil Brutsche p...@optimumdata.com wrote:
Or use Wireshark to make sure you don't see traffic you shouldn't.
On 6/9/2010 3:41 PM, Jason Gauthier wrote:
You use NMAP to do network scans to determine what is accessible
.
-Original Message-
From: Malcolm Reitz [mailto:malcolm.re...@live.com]
Sent: Wednesday, June 09, 2010 9:17 AM
To: NT System Admin Issues
Subject: RE: OTish: Wireless network configuration
Do you do anything to prevent random people outside your office from
connecting to your guest wireless
You should provide specifics, instead of ambiguity.
Ambiguity helps no one, last I checked.
-Original Message-
From: Kurt Buff [mailto:kurt.b...@gmail.com]
Sent: Wednesday, June 09, 2010 4:50 PM
To: NT System Admin Issues
Subject: Re: OTish: Wireless network configuration
And more than
: Wednesday, June 09, 2010 4:50 PM
To: NT System Admin Issues
Subject: Re: OTish: Wireless network configuration
And more than that will be needed, as well.
On Wed, Jun 9, 2010 at 13:44, Phil Brutsche p...@optimumdata.com wrote:
Or use Wireshark to make sure you don't see traffic you shouldn't
In other words, this:
http://www.cisco.com/en/US/products/hw/switches/ps708/products_white_paper09186a008013159f.shtml
On 6/9/2010 5:12 PM, Kurt Buff wrote:
AFAIK, nmap and wireshark won't tell you as much as you need to know
about arp flooding, vlan hopping and suchlike. Well, wireshark
, 2010 4:50 PM
To: NT System Admin Issues
Subject: Re: OTish: Wireless network configuration
And more than that will be needed, as well.
On Wed, Jun 9, 2010 at 13:44, Phil Brutsche p...@optimumdata.com
wrote:
Or use Wireshark to make sure you don't see traffic you shouldn't.
On 6/9
should provide specifics, instead of ambiguity.
Ambiguity helps no one, last I checked.
-Original Message-
From: Kurt Buff [mailto:kurt.b...@gmail.com]
Sent: Wednesday, June 09, 2010 4:50 PM
To: NT System Admin Issues
Subject: Re: OTish: Wireless network configuration
.
-Original Message-
From: Kurt Buff [mailto:kurt.b...@gmail.com]
Sent: Wednesday, June 09, 2010 4:50 PM
To: NT System Admin Issues
Subject: Re: OTish: Wireless network configuration
And more than that will be needed, as well.
On Wed, Jun 9, 2010 at 13:44, Phil Brutsche p
All,
We've got a decent wireless network at $WORK, but I'm dissatisified
with it, because it lacks good guest access.
We have 18 Cisco 1240ag WAPs talking with 3 HP POE switches, which
currently are in our HP 3400cl layer 3 switch on our production
network. There's a single SSID across all of
On Tue, Jun 8, 2010 at 7:29 PM, Kurt Buff kurt.b...@gmail.com wrote:
I could just stick them all physically outside our firewall, and give
the wireless users an IPSec VPN client, but I really would prefer not
to do that.
Why not?
We already had a working VPN solution. When we added
On Tue, Jun 8, 2010 at 16:38, Ben Scott mailvor...@gmail.com wrote:
On Tue, Jun 8, 2010 at 7:29 PM, Kurt Buff kurt.b...@gmail.com wrote:
I could just stick them all physically outside our firewall, and give
the wireless users an IPSec VPN client, but I really would prefer not
to do that.
Cisco WAPs support 802.1q tagged VLANs and can provide a unique SSID
per VLAN. Each SSID can use different authentication methods (WEP
WPA, no auth WPA, no auth 802.1x, etc).
If so desired I can provide CLI configuration examples from my 1231G
access points. The 1240 series won't be any
Does the Windows L2TP client (XP is what we run) support access prior to login?
Our firewall does support IPSec, and should support L2TP, though I'd
ahve to verify that.
I would love to see the CLI info for the WAPs.
I'm not knowledgeable enough on the networking to speak to 802.1x or
802.1q -
Admin Issues
Subject: OTish: Wireless network configuration
All,
We've got a decent wireless network at $WORK, but I'm dissatisified with it,
because it lacks good guest access.
We have 18 Cisco 1240ag WAPs talking with 3 HP POE switches, which currently
are in our HP 3400cl layer 3 switch
configuration for us.
-Original Message-
From: Kurt Buff [mailto:kurt.b...@gmail.com]
Sent: Tuesday, June 08, 2010 7:29 PM
To: NT System Admin Issues
Subject: OTish: Wireless network configuration
All,
We've got a decent wireless network at $WORK, but I'm dissatisified with it,
because
I've haven't done it with L2TP but I have done it with PPTP. I don't
see why it would be any different - the login dialog doesn't
distinguish between L2TP, PPTP, or true dial up via analog modem or
ISDN.
On the system login dialog there is a check box called Log on with
dial-up
Cool.
I'll have to read up on that too.
On Tue, Jun 8, 2010 at 19:38, Phil Brutsche p...@optimumdata.com wrote:
I've haven't done it with L2TP but I have done it with PPTP. I don't see why
it would be any different - the login dialog doesn't distinguish between
L2TP, PPTP, or true dial up via
34 matches
Mail list logo