.
Tom Zeller
Indiana University
812.855.6214
[EMAIL PROTECTED]
On 9/11/07 9:42 AM, "Joseph Karam" <[EMAIL PROTECTED]> wrote:
> Hi Folks,
>
> We implemented a secure wireless network this summer with WPA security and
> PEAP authentication. Now many of our folks wit
lso a suggestion to deploy
11n only in the 5 GHz range and leave 2.4 to b/g.
The audio comes through computer, along with powerpoint slides. I felt like
it was time well spent
Tom Zeller
Indiana University
[EMAIL PROTECTED]
--
Dear Tom,
Thank you for attending AirWave¹s we
additional cost of adding 11a to the mix is
substantial. The cost of denser deployment (we currently have what I think
of as edge-to-edge coverage, with little overlap) is also non-trivial.
I would be interested to hear other's opinions on these questions.
Tom Zeller
Indiana Univer
the major brands).
I don't see the centralized management aspect of CBW to be the driving force
for us.
Tom Zeller
Indiana University
[EMAIL PROTECTED]
**
Participation and subscription information for this EDUCAUSE Constituent Group
discussion list can be found at http://www.educause.edu/groups/.
Never done it, but it sure seems that if the cert is from an entity the
client machine trusts, the user would never be aware of the change.
Tom Zeller
Indiana University
On 5/3/07 8:00 PM, "Julian Y. Koh" <[EMAIL PROTECTED]> wrote:
> -BEGIN PGP SIGNED MESSAGE-
&g
I would be interested in hearing from anyone using Trapese at a scale of
200+ access points. You can email me off-list at:
[EMAIL PROTECTED]
If you love them, hate them, or would be willing to have a phone
conversation with me about the product.
Thanks.
Tom Zeller
Indiana University
812-855
HP has a product in this space, assuming you are looking for a
controller-based system. They have a reasonable feature list, and as with
most HP network products, no annual maintenance costs.
Tom Zeller
Indiana University
812-855-6214
On 2/6/07 3:50 PM, "Mike Tennyson" <[EM
should go into auto-update, please
respond to me (NOT TO THE LIST!) and I will compile a list of enterprises
for our conversation with Microsoft.
Tom Zeller
Indiana University
812-855-6214
**
Participation and subscription information for this EDUCAUSE Constituent Group
discussion list
d Hoc local department network with legit special need (Health Center?)
6. Appliances - for Tivos, game consoles, whatever.
access via mac address registration
access to internet, with some blocks, but not campus
perhaps access across the dorm network
Tom Zeller
Indiana University
[
At home over WiFi my Mac does lose connection in about that timeframe.
However I talked to one of our main mac nerds and he uses Mac from home thru
NAT to the ASA and stays up for hours.
I was under the impression that the ASA code was explicitly NOT the 3000
code.
On 9/25/06 6:08 PM, "Julian
I've been told one really awful thing about Vista RC2 WiFi: it sees each
AP, even with the same SSID, as a new network. There may have to be user
interaction as each new AP is discovered. There is an option to merge all
the APs of one SSID into a single network, but it is a buried, manual
option
> P.S. BTW, it's 802.1X, not 802.1x. If you look at the IETF document you'll
> see an uppercase 'x' is used.
>
> -Original Message-
> From: Tom Zeller [mailto:[EMAIL PROTECTED]
> Sent: Monday, February 27, 2006 2:29 PM
> To: WIRELESS-LAN@LISTSERV
c and PC though it works well once connected.
Using the same laptops with a test of broadcast SSID and they both connected
reliably and much faster.
If anyone has any ideas that this can NEVER work, or that you are in fact
doing this, I'd be interested in hearing about it.
Tom Zeller
India
devices
that don't easily (e.g. For free) support IPSEC.
C) IPSEC has it's strengths, but authentication is not one of them. Now
that IKE v2 is done incorporating EAP we should see clients with less
vulnerabile authentication.
Tom Zeller
Indiana University
[EMAIL PROTECTED]
812-855-6214
of Domain Users).
If you don’t broadcast the SSID and the guest network isn’t ubiquitous the user can’t tell if they are in range or not.
Tom Zeller
812-855-6214
[EMAIL PROTECTED]
On 1/31/06 12:07 PM, "Casey, J Bart" <[EMAIL PROTECTED]> wrote:
Hey All,
It has been deemed
Title: Re: [WIRELESS-LAN] Quick Wireless Survey
We are one of the larger wireless campuses. We have 1800 access points. We have about 1200 users as we speak. The campus has a 2 Gb/sec commodity internet link and a 1 gb/sec Internet2 link. Not sure what you mean by “lines for wireless”. Here
other tool: One of our engineers carries a WiFi telephone (we don't
support this generally) as an application-level test of wireless
connectivity. If he gets good voice quality on the phone, his laptop
will be happy too. And it's a faster test than booting a laptop.
Tom Zeller
Tel
Title: Wireless Policy - Indiana University
Indiana University’s policy on wireless can be found at:
http://www.itpo.iu.edu/IT20.html
--
Tom Zeller
Telecommunications Technical Advisor
University Information Technology Services
Indiana University
[EMAIL PROTECTED] (812) 855-6214
. In the long run we can imagine all datajacks being protected via 802.1x, but for us that will require a changeout of around two thousand switches, which is at least three years away.
--
Tom Zeller
Telecommunications Technical Advisor
University Information Technology Services
Indiana University
Title: Re: WIRELESS-LAN Digest - 22 Nov 2002 to 23 Nov 2002 (#2002-50)
In response to Mike Greigo’s questions:
Yes, an unauthenticated wireless user could attack another wireless user. Until 802.1x become real I don’t know of a way around that.
It is my understanding that an attacker could not
users based upon their membership in an ADS group, which we do for special cases to tighten security on particular servers.
If someone would like to discuss VPN issues further, we should go off-line as it’s a bit off topic for this list.
Tom Zeller
Telecommunications Technical Advisor
Indiana
21 matches
Mail list logo