That's great information!

I had also seen something about that L2 crypto group key piece, with a
workaround of enlarging the EAP broadcast key interval using "config
advanced eap bcast-key-interval <seconds>".  And, yes, that would be very
unusual.

Jason Boyers, CCIE #26024 (Wireless)
Blog: netboyers.wordpress.com


On Sun, Jul 22, 2012 at 8:42 PM, Aaron Leonard <[email protected]> wrote:

> Here's a little-known fact about CUWN: lightweight APs (in local mode at
> any rate; I'm not sure about locally-switched Flexconnect) will just
> ignore any 802.11 deauths from their clients.  So even if it true that
> Apple iOS devices send a deauth when they go to sleep, we'll ignore it
> anyway.
>
> One gotcha with sleeping Webauth clients comes into play if you have some
> kind of L2 crypto on the WLAN.  When the AP goes to rotate the
> group key, sleeping clients won't respond to the group key update
> messages.  So then we *will* get rid of those clients.  (Admittedly
> it is somewhat aberrant to have L2 crypto on a Webauth WLAN.)
>
> Aaron
>
> ----
>
> On 7/22/2012 4:08 PM, 
> ccie_wireless-request@**onlinestudylist.com<[email protected]>(
> ccie_wireless-request@**onlinestudylist.com<[email protected]>)
> wrote:
>
>> Second,
>> iPads (and possibly iPhones) send an active deauthentication when they go
>> to sleep or hibernate.  So, they will be removed.
>>
> ______________________________**_________________
> For more information regarding industry leading CCIE Lab training, please
> visit www.ipexpert.com
>
> Are you a CCNP or CCIE and looking for a job? Check out
> www.PlatinumPlacement.com
>
_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit 
www.ipexpert.com

Are you a CCNP or CCIE and looking for a job? Check out 
www.PlatinumPlacement.com

Reply via email to