Hector J Rios wrote:
> Once in a while we get calls from the university police department
> asking us to search for stolen laptops. We use the stolen laptop’s MAC
> address to search in both DHCP and WCS (we are a Cisco shop). We’ve
> never been successful in recovering a stolen laptop. So far the
802.1x or MAC filtering, or both... In a previous life I supported wireless
for a large manufacturer with myriad dumb devices (thatis devices that
couldn¹t do 802.1x) so we did a mix an SSID that did MAC filtering for DUMB
devices and a SSID for 802.1x
On 12/10/08 3:30 PM, "John Duran" <[EMAIL PR
Scenario: RF Design for an Arena area. We can easily design for the known
devices we are anticipating will connect to the Wi-Fi.
Challenge: How are others restricting connectivity to the Wi-Fi for those
devices (e.g. Dual mode cell phones and other Wi-Fi enabled personal devices)
that do no
We are an all Cisco shop but user Bradford Campus Manager as our NAC
solution.
When we get a report from University Policy we add the client records to
a "Stolen Devices" group. When the device is reconnected we receive an
email.
We then either report the room # that the switch port is connected
Going back to fat APs and WLSE (Cisco manager), I have been asking that
this be made a feature in central management. As a WCS user right now,
it seems very natural to want to say "alert me when this MAC address
hits the WLAN" whether it be for stolen laptops or other targeted
investigative/monitor
We have home grown scripts that harvest all mac addresses from our cisco edge
switches and cisco wireless controllers. We store these mac addresses in a
database along with what device (and port/radio) they were connected to. With
this data, it was easy for us to write a script to take a list
Hello All,
We've encountered an odd problem with some new Lenovo R400 laptops using
Intel 5100 wireless (with latest drivers) and our Cisco wireless
network. If one of these clients connects to an 802.11n or WMM-enabled
SSID, and a large file transfer is started, traffic stops passing for
(a
We do more or less the same thing. Since you have to either register
your laptop and the registration logs the MAC, or you're using WPA and
the MAC gets logged via radius, finding this information tends to be
fairly easy even if the user doesn't remember it themselves. We do
have a script which, I
If you are using Airwave it has the capability to send out an e-mail if a
specific wireless MAC is detected. This functionality can be configured
under the "trigger section".
Stephen Holland
Network Engineer
Northeastern University
**
Participation and subscription information for this
We have used Computrace on all our laptops for over 10 years. With the
exception of a couple that called in from Iran and Russia, we have been
able to recover all our stolen units. Needless to say it works quite
well, and the company is great to work with.
Steven Eisenberg
Director of Technolog
Hector J Rios wrote:
Once in a while we get calls from the university police department
asking us to search for stolen laptops. We use the stolen laptop’s MAC
address to search in both DHCP and WCS (we are a Cisco shop). We’ve
never been successful in recovering a stolen laptop. So far the
t
I'm guessing there are a number of us who would like to hear more about
how the Computrace worked out for you if you don't mind following up.
Pete M.
-Original Message-
From: The EDUCAUSE Wireless Issues Constituent Group Listserv
[mailto:[EMAIL PROTECTED] On Behalf Of Tim Cantin
Sent: Wed
We put CompuTrace on all our college-owned laptops, and Campus Police had
direct access to the admin portal for it. When something is stolen, they
don't even need our involvement.
BTW, I'm assuming a stolen laptop won't be put back on OUR network, but
eventually it may hit someone else's. As s
13 matches
Mail list logo