I have not seen the UA_ hostnames, but wifi hotspots in public places will pick up tons of phones and tablets and whoozits that are just passing by. The only action I would take is to be even more aggressive on the lease time. A 10 minute lease will not hurt anybody.

On 6/16/2015 4:27 PM, Ken Hohhof wrote:
Fast food franchise at tollway oasis had us set up an open guest hotspot as a Virtual AP on their Mikrotik, and we see random WiFi connections and DHCP leases for MAC addresses starting with 00:16:A4 and hostnames starting with UA followed by a bunch of numbers. The WiFi signal is always low, around -90.

Doing some research on the web, I think this may be due to vehicle tracking systems, I'm not sure if these are vehicles in the parking lot or whizzing by on the tollroad. Also not sure if they are from the vehicle or the intermodal container it is carrying.

I'm not sure it is a big problem, we have the DHCP lease time set to 30 minutes.

Has anyone else run into this, and if so, did you take any action? I guess we could block connections from those MAC addresses, or maybe set a higher signal threshold to connect. Or maybe we should just let them check their location or call the mothership or whatever they do.

BTW, don't say this is a DOS attack trying to exhaust the DHCP leases, they dribble in 1 or at most 2 at a time. If we had the DHCP leases set to 30 days, it could be a problem unless we expanded the pool.


Reply via email to