HI Kevin, Sorry for my late answer here.
> My apologies if this question has been previously addressed: are there any > known issues with mobile devices such as smart phones, I-phones, etc and > packetfence? Nope! > My understanding of how pf and wireless devices works: the user first > connects to the open SSID and registers the device by entering their user > credentials in the captive portal webpage. After that has been > completed,they then need to disconnect and re-connect to the secure SSID > (using the proper passphrase) and if the wireless adapter mac address is > properly registered, they are allowed to connect every time there-after > without user intervention ... correct? That's correct. In fact, we support SNMP or SSH de-association on most wireless controllers or APs, so the user doesn't need to touch anything, it will be deassociated automatically by PacketFence. > So a smart phone should behave the same as a laptop in this regard since it > is the device mac address that matters, correct? Am I missing anything? Phones will behave the same way as laptops. -- Francois Gaudreault, ing. jr [email protected] :: +1.514.447.4918 (x130) :: www.inverse.ca Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence (www.packetfence.org) ------------------------------------------------------------------------------ Cloud Services Checklist: Pricing and Packaging Optimization This white paper is intended to serve as a reference, checklist and point of discussion for anyone considering optimizing the pricing and packaging model of a cloud services business. Read Now! http://www.accelacomm.com/jaw/sfnl/114/51491232/ _______________________________________________ Packetfence-users mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/packetfence-users
