Is you security configured as either open or WPA using AES? Under the
controller GUI WLANs>Edit page footnotes -
7 WMM and open or AES security should be enabled to support higher 11n rates
Hope this helps,
Ryan Sullivan
Datacommunications
ACT, UCSD
858-822-5602
-Original Message-
From:
For the record, Emory has been using WPA/2-Enterprise (802.1x) for our
authenticated wireless infrastructure since 2006. There's one data point for
you...
>>-> Stan Brooks - CWNA/CWSP
Emory University
University Technology Services
404.727.0226
AIM/Y!/Twitter: WLANstan
Jethro -
On the Web App side we capture who entered the MAC and when along with the
wireless users ID, device type, and if it's a student or faculty/staff so we
can age out the students at the end of term. On the RADIUS side, we log auth
times so we can see the last time they authenticated - wh
Is the AP configured with 2 transmit antennas? Try rebooting/
resetting the AP to factory default? Toggling ClientLink?
Bruce T. Johnson | Network Engineer | Partners Healthcare |
617.726.9662 bjohns...@partners.org
On Apr 13, 2010, at 11:33 AM, "Mike King" wrote:
Ok. I had my controll
>From the links you provided, for the current generation products, it appears
to be more based web and SNMP based vulnerabilities. IE they're talking
about Cross site scripting and other web based attacks on the web based GUI.
They even go so far to say these vulnerabilities are well known. I
wou
My only concern with the controller in the cloud approach.
What happens if you decide not to pay maintenance.
Do all your AP's turn into paper weights? They keep running, just with the
last config that was loaded?
(Times get tough, sometimes you have to cut corners to keep the ship
floating. I'
It should also be noted that not all "controller in the cloud"
solutions are the same. The key difference is the control plane.
While the data plane is distributed and the management plane is
centralized the control plane will be handled differently depending on
the vendor.
If the control plane i
The only competitors we've been able to find in the past involves purchasing
and deploying supplicants for each client.
Why not just use the CloudPath product itself?
The other competitors are the OS companies, ie Apple and Microsoft. They seem
to be getting better and better at figuring out ho
Hi Randy - I'll send you the snippet of code off list.
To answer your question for the list - yes, a last resort, but it can also
depend on the issue.
ex. Those identified as being compromised or those exhibiting malicious
behaviors are immediately blocked.
Notices are sent to local IT enti
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi Everyone,
We're looking at deploying WPA/WPA2 and we think that something similar to
XpressConnect from CloudPath would be very beneficial. However, in searching I
have been unable to determine if there are any vendors offering a similar
service.
Dear folks,
This may be something you're already familiar with. But I'm passing it on for
what it's worth
Someone just sent me this link, to a ZDnet story apparently reporting on a
presentation at BlackHat/Europe conference.
http://www.zdnet.co.uk/news/security-threats/2010/04/16/security-
Hi Ethan, et al,
I am new to the list but noticed this discussion and thought I might offer
my two cents. I work at Westmont College, a liberal arts college in the
Santa Barbara area. We evaluated Aruba, Cisco and Meraki last summer. We
had a previous Aruba installation, running for several ye
In this case, we ruled out everything obvious and worked back to a single
controller- reboot, issue resolved.
From: The EDUCAUSE Wireless Issues Constituent Group Listserv
[mailto:wireless-...@listserv.educause.edu] On Behalf Of Jeffrey Sessler
Sent: Wednesday,
Dear All
We also want to assign one staff to block and unblock the baleful wireless
MAC addresses. Furthermore, this person should not configure other features
on both WCS and controllers.
However, in order to modify the disabled clients' template, the person also
has the right to modify ot
I would be interested in the code from a curiosity perspective, but I also
wanted to ask how this is received from a user perspective.
Is this a feature that you use as a last resort?
We have always bent over backwards to attempt (as much as practical) to steer
the user into a web page that tel
We keep a separate database including username, date registered, and type of
device, in addition to the MAC address. We would use this database to
determine when a device should be expired.
-Original Message-
From: The EDUCAUSE Wireless Issues Constituent Group Listserv
[mailto:wireles
Has anyone come across a reference that shows statistics on 802.1x
adoption in the US?
(I mostly find references on Wired 802.1X adoption (gartner))
I'm writing a NSF proposal to request funding to deploy eduroam more
widely in the US
and could really use the numbers.
I feels like trying to
On Thu, 15 Apr 2010, Brooks, Stan wrote:
> Our system uses Mac-Auth via RADIUS. We've built a
> custom web app in house that updates the RADIUS auth database so trusted
> people (some of our clean room techs and others) can verify the type of
> device and enter the MAC into the system.
Other
18 matches
Mail list logo