On Thu, 15 Apr 2010, Brooks, Stan wrote:
Our system uses Mac-Auth via RADIUS. We've built a
custom web app in house that updates the RADIUS auth database so trusted
people (some of our clean room techs and others) can verify the type of
device and enter the MAC into the system.
Other
Has anyone come across a reference that shows statistics on 802.1x
adoption in the US?
(I mostly find references on Wired 802.1X adoption (gartner))
I'm writing a NSF proposal to request funding to deploy eduroam more
widely in the US
and could really use the numbers.
I feels like trying
We keep a separate database including username, date registered, and type of
device, in addition to the MAC address. We would use this database to
determine when a device should be expired.
-Original Message-
From: The EDUCAUSE Wireless Issues Constituent Group Listserv
I would be interested in the code from a curiosity perspective, but I also
wanted to ask how this is received from a user perspective.
Is this a feature that you use as a last resort?
We have always bent over backwards to attempt (as much as practical) to steer
the user into a web page that
Dear All
We also want to assign one staff to block and unblock the baleful wireless
MAC addresses. Furthermore, this person should not configure other features
on both WCS and controllers.
However, in order to modify the disabled clients' template, the person also
has the right to modify
In this case, we ruled out everything obvious and worked back to a single
controller- reboot, issue resolved.
From: The EDUCAUSE Wireless Issues Constituent Group Listserv
[mailto:wireless-...@listserv.educause.edu] On Behalf Of Jeffrey Sessler
Sent:
Hi Ethan, et al,
I am new to the list but noticed this discussion and thought I might offer
my two cents. I work at Westmont College, a liberal arts college in the
Santa Barbara area. We evaluated Aruba, Cisco and Meraki last summer. We
had a previous Aruba installation, running for several
Dear folks,
This may be something you're already familiar with. But I'm passing it on for
what it's worth
Someone just sent me this link, to a ZDnet story apparently reporting on a
presentation at BlackHat/Europe conference.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi Everyone,
We're looking at deploying WPA/WPA2 and we think that something similar to
XpressConnect from CloudPath would be very beneficial. However, in searching I
have been unable to determine if there are any vendors offering a similar
service.
Hi Randy - I'll send you the snippet of code off list.
To answer your question for the list - yes, a last resort, but it can also
depend on the issue.
ex. Those identified as being compromised or those exhibiting malicious
behaviors are immediately blocked.
Notices are sent to local IT
The only competitors we've been able to find in the past involves purchasing
and deploying supplicants for each client.
Why not just use the CloudPath product itself?
The other competitors are the OS companies, ie Apple and Microsoft. They seem
to be getting better and better at figuring out
It should also be noted that not all controller in the cloud
solutions are the same. The key difference is the control plane.
While the data plane is distributed and the management plane is
centralized the control plane will be handled differently depending on
the vendor.
If the control plane is
My only concern with the controller in the cloud approach.
What happens if you decide not to pay maintenance.
Do all your AP's turn into paper weights? They keep running, just with the
last config that was loaded?
(Times get tough, sometimes you have to cut corners to keep the ship
floating.
From the links you provided, for the current generation products, it appears
to be more based web and SNMP based vulnerabilities. IE they're talking
about Cross site scripting and other web based attacks on the web based GUI.
They even go so far to say these vulnerabilities are well known. I
Is the AP configured with 2 transmit antennas? Try rebooting/
resetting the AP to factory default? Toggling ClientLink?
Bruce T. Johnson | Network Engineer | Partners Healthcare |
617.726.9662 bjohns...@partners.org
On Apr 13, 2010, at 11:33 AM, Mike King m...@mpking.com wrote:
Ok. I
Jethro -
On the Web App side we capture who entered the MAC and when along with the
wireless users ID, device type, and if it's a student or faculty/staff so we
can age out the students at the end of term. On the RADIUS side, we log auth
times so we can see the last time they authenticated -
Is you security configured as either open or WPA using AES? Under the
controller GUI WLANsEdit page footnotes -
7 WMM and open or AES security should be enabled to support higher 11n rates
Hope this helps,
Ryan Sullivan
Datacommunications
ACT, UCSD
858-822-5602
-Original Message-
From:
17 matches
Mail list logo