I threw in the towel and started adding the MACs to our controller
blacklist to allow the APs to reject them at that level.  Not as clean
as you're suggesting, but diminishing returns..

thanks
mike

On 7/18/18 10:38 AM, John Kristoff wrote:
Friends,

Over time there is some non-negligible number of devices and systems
that attempt to connect and authenticate to an institution's WiFi
network.  Many of these seem to be from devices or systems that had
been configured with a former employee, student, or affiliated user's
credentials that are no longer valid if they ever were.  Some of these
forgotten clients might try to authenticate thousands of times a day.

While they may not cause a significant operational problems hammering
away, it would be nice to keep the airspace and auth logs as clean as
possible.

I've perused a couple of odd solutions that purport to do some form of
triangulation, but before I dig too far done this road I thought I'd
issue a query here.

What do you do or do you recommend to locate and eradicate poorly
managed and inspid WiFi clients?

Thank you,

John

**********
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/discuss.


--
 Mike Davis
 Systems Programmer V
 NSS - University of Delaware  - 302.831.8756
 Newark, DE  19716         Email da...@udel.edu

**********
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/discuss.

Reply via email to