That's great information! I had also seen something about that L2 crypto group key piece, with a workaround of enlarging the EAP broadcast key interval using "config advanced eap bcast-key-interval <seconds>". And, yes, that would be very unusual.
Jason Boyers, CCIE #26024 (Wireless) Blog: netboyers.wordpress.com On Sun, Jul 22, 2012 at 8:42 PM, Aaron Leonard <[email protected]> wrote: > Here's a little-known fact about CUWN: lightweight APs (in local mode at > any rate; I'm not sure about locally-switched Flexconnect) will just > ignore any 802.11 deauths from their clients. So even if it true that > Apple iOS devices send a deauth when they go to sleep, we'll ignore it > anyway. > > One gotcha with sleeping Webauth clients comes into play if you have some > kind of L2 crypto on the WLAN. When the AP goes to rotate the > group key, sleeping clients won't respond to the group key update > messages. So then we *will* get rid of those clients. (Admittedly > it is somewhat aberrant to have L2 crypto on a Webauth WLAN.) > > Aaron > > ---- > > On 7/22/2012 4:08 PM, > ccie_wireless-request@**onlinestudylist.com<[email protected]>( > ccie_wireless-request@**onlinestudylist.com<[email protected]>) > wrote: > >> Second, >> iPads (and possibly iPhones) send an active deauthentication when they go >> to sleep or hibernate. So, they will be removed. >> > ______________________________**_________________ > For more information regarding industry leading CCIE Lab training, please > visit www.ipexpert.com > > Are you a CCNP or CCIE and looking for a job? Check out > www.PlatinumPlacement.com >
_______________________________________________ For more information regarding industry leading CCIE Lab training, please visit www.ipexpert.com Are you a CCNP or CCIE and looking for a job? Check out www.PlatinumPlacement.com
