HI Kevin,

Sorry for my late answer here.

> My apologies if this question has been previously addressed: are there any
> known issues with mobile devices such as smart phones, I-phones, etc and
> packetfence?
Nope!

> My understanding of how pf and wireless devices works: the user first
> connects to the open SSID and registers the device by entering their user
> credentials in the captive portal webpage. After that has been
> completed,they then need to disconnect and re-connect to the secure SSID
> (using the proper passphrase) and if the wireless adapter mac address is
> properly registered, they are allowed to connect every time there-after
> without user intervention ... correct?
That's correct.  In fact, we support SNMP or SSH de-association on most 
wireless controllers or APs, so the user doesn't need to touch anything, 
it will be deassociated automatically by PacketFence.

> So a smart phone should behave the same as a laptop in this regard since it
> is the device mac address that matters, correct? Am I missing anything?
Phones will behave the same way as laptops.


-- 
Francois Gaudreault, ing. jr
[email protected]  ::  +1.514.447.4918 (x130) ::  www.inverse.ca
Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence 
(www.packetfence.org)


------------------------------------------------------------------------------
Cloud Services Checklist: Pricing and Packaging Optimization
This white paper is intended to serve as a reference, checklist and point of 
discussion for anyone considering optimizing the pricing and packaging model 
of a cloud services business. Read Now!
http://www.accelacomm.com/jaw/sfnl/114/51491232/
_______________________________________________
Packetfence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to