--
> James P. Black
> Associate Provost, Information Systems and Technology
> University of Waterloo
> Waterloo, Ontario. N2L 3G1
>
> Ph. +1 (519) 888-4567, x5474
> Fax. +1 (519) 725-2052
> E-Mail: [EMAIL PROTECTED]
> URL: http://www.ist.uwaterloo.ca/~jpblack
[ A
he client has dis-associated the AP-1000s will reply for those MAC
addresses. This causes all sorts of trouble in an environment that
supports roaming. Make sure proxy ARP is turned off.
Hope that helps.
Chris -)-
--
Christopher R. Hertel -)- University of Minnesota
[EMAIL
cryption schemes... these
may require new hardware.
That's another reason to buy cheap. It won't hurt as much if/when the
units need to be replaced.
I hope that's of some use.
If you are interested in the commercial vendors we are looking at, ping me
offline: [
Chris -)-
--
Samba Team -- http://www.samba.org/ -)- Christopher R. Hertel
jCIFS Team -- http://jcifs.samba.org/ -)- ubiqx development, uninq.
ubiqx Team -- http://www.ubiqx.org/ -)- [EMAIL PROTECTED]
OnLineBook -- http://ubiqx.org/cifs/-)- [EMAIL
to its being a convenient testing ground it is
also much more in need of protection.
In all this, we wage a constant battle against proprietary solutions and
the demand for "convenience". Our only defense is to educate our users.
Chris -)-
--
Christopher R. Hertel -)-
n information for this
> EDUCAUSE Constituent Group discussion list can be found at
> http://www.educause.edu/memdir/cg/. Yahoo! Mail Plus - Powerful.
> Affordable. Sign up now
--
Christopher R. Hertel -)- Network Design Engineer
[EMAIL PROTECTED]
ith RF noise by explaining to users who complain that
wireless is not as robust as wired.
10. Has there been an impact on staffing/support levels since the
implementation?
Existing staff have had more work to do.
11. Is there any information that you could supply regarding
did include an SSL-capable
browser for PalmOS.
Chris -)-
--
Christopher R. Hertel -)- University of Minnesota
[EMAIL PROTECTED] Networking and Telecommunications Services
"Implementing CIFS - the Common Internet FileSystem" ISBN: 013047116X
**
he VPN
server is a proprietary system with a limited set of clients. We can
easily fix this by adding additional VPN servers that support different
client sets. There has been little demand, however.
3) We are looking at adding support for 802.1x and newer WiFi security
systems,
it is possible for this platform to be used in our environment. I
> have no doubt that someone will try it.
What about *BSD or PalmOS or Palmtop Linux?
We cannot provide tech support for every platform either. The goal,
though, is to ensure that we are not blocking anyone based on their
pla
On Mon, Aug 25, 2003 at 04:44:54PM -0400, Doug Payne wrote:
> Christopher R. Hertel wrote:
> >On Mon, Aug 25, 2003 at 02:17:21PM -0500, Scott Genung wrote:
> >:
> >
> >>We do not support Linux clients.
> >
> >
> >I am baffled by this. How can a Uni
We've looked at the Soekris boxes with the VPN cards as a
possible platform (www.soekris.com).
A lot depends on how much roll-your-own you want to do. So far, we've
found (despite a hefty installed base) that the workload is not quite
enough to justify the cost of a commercial soluti
7;ve taked with the
Reefedge folks about their product, which we liked) but I don't know of
any practical applications. How would you use this? (Probably obvious
but I haven't thought it through.)
Chris -)-
--
Christopher R. Hertel -)- University of Minneso
ablish those policies and how to ensure
that the enforcement of the policies is properly contained.
It would be hard for us to implement the example policy you describe
because we have many APs that serve two classrooms and/or hallways etc.
Some APs leak signal through several floors in some bu
on a per-user level might work but that doesn't
> prevent users from borrowing someone else's ID. I just see support
> issues with this.
That's my gut feeling, but it is an interesting feature and worth
considering.
> PS We use the cheaper Colubris CN3500: Bluesock
epartmental space (we
call it "Etherjack service"). That's the only fee for connecting up.
Some departments have chosen to build their own firewall and use the
software we built. That's okay too, since it provides the users with the
same look-and-feel. The only downside is is
have some robots on
> campus), etc. You can put bandwidth abusers in a group and rate
> limit them, nachi infected users cannot ping, etc. One should not get too
> excited about this functionality though! It is a management nightmare!
> Keeping things relatively simple made our wir
ed longer term
> >>scalability. That means APs that properly understand VLANs.
> >
> >
> >With a transceiver-type AP, the back-end device could handle the vLANs.
> >:)
> >
> >Okay, one feature that would be nice on a transceiver type AP would be GRE
> >
vices),
- and are using H mode,
then there won't be too much NBT broadcast traffic. That DHCP trick is
probably the best way to ensure correct configuration for the majority of
Windows clients.
See also: http://ubiqx.org/cifs/NetBIOS.html#NBT.4.3.1.3
Hope that's helpful!
Ch
19 matches
Mail list logo