Yeap, same result. Will reboot them tonight to see.
On Fri, Feb 3, 2017 at 7:02 PM Eliezer Sena wrote:
> Did you tried with another frequency and SSID?
>
> Also try it with 6.0 firmware.
>
> Regards!
> Ing. Eliezer Sena
>
> On Feb 2, 2017 11:46 AM, "Josh Luthman"
Did you tried with another frequency and SSID?
Also try it with 6.0 firmware.
Regards!
Ing. Eliezer Sena
On Feb 2, 2017 11:46 AM, "Josh Luthman" wrote:
> Noise floor has always been fake, I'd ignore it.
>
> Josh Luthman
> Office: 937-552-2340 <(937)%20552-2340>
>
No I am not returning that attribute, that is an excellent suggestion. If
ubiquiti supports this, this would work.
Thanks
Sent from my iPhone
On Feb 2, 2017, at 4:45 PM, Scott Lambert
> wrote:
Are you returning a session-timeout attribute
Thanks.
On Fri, Feb 3, 2017 at 6:41 PM Mitch wrote:
> get James to chime in
>
> James Craig
>
> Mitch Koep
>
> 218-851-8689 cell
>
> On 02/02/2017 09:11 PM, Mitch wrote:
>
> ok what firmware?
>
> 5.5.11 works well for us
>
> 5.6.9 and
get James to chime in
James Craig
Mitch Koep
218-851-8689 cell
On 02/02/2017 09:11 PM, Mitch wrote:
ok what firmware?
5.5.11 works well for us
5.6.9 and 6.6 did not do so well
Mitch
On 02/02/2017 02:31 PM, Jorge Santiago wrote:
Non AC.
On Thu, Feb 2, 2017 at 3:20
Maybe an ssl cert would survive reboot with -cs firmware?
https://community.ubnt.com/t5/airOS-Software-Configuration/airOS-5-6-with-Custom-Script-Support/m-p/1624488#U1624488
On Fri, Feb 3, 2017 at 10:18 AM Sam Tetherow wrote:
> Have you done this post 5.6.4+ firmware? I
Have you done this post 5.6.4+ firmware? I just did a quick look
through the interface and didn't see any place to change the certificate
and local modifications are wiped on reboot now.
On 02/03/2017 10:02 AM, Jesse DuPont wrote:
To truly do away with the warning, you'd need:
1) a
I think you are stuck with browser hacks. The problem is that the
certificate needs to contain the hostname for the individual site which
is then used to check with DNS for that hostname to see if it matches
the IP.
You might have been able to circumvent it by using a wildcard
certificate
Can you not somehow use certificates to get around that nag?
On 2/3/2017 9:30 AM, ty...@wigi.us wrote:
> Wish I knew of one curious if anyone does. :-)
>
> - Original Message -
> Subject: [Ubnt_users] Https:
> From: "Steve Barnes"
> Date: 2/3/17
I've read about ways to disable those notifications on individual
computers but haven't tried it yet.
ty...@wigi.us wrote:
> Wish I knew of one curious if anyone does. :-)
>
> - Original Message -
> Subject: [Ubnt_users] Https:
> From: "Steve Barnes"
Wish I knew of one curious if anyone does. :-)
- Original Message - Subject: [Ubnt_users] Https:
From: "Steve Barnes"
Date: 2/3/17 10:04 am
To: "'Ubiquiti Users Group (ubnt_users@wispa.org)'"
Having several thousand UBNT devices that
Having several thousand UBNT devices that use HTTPS, is there any way to get
around the: Your Connection is not private, then clicking advanced and then
Proceed to 10.0.0.1 (unsafe).
Some I have turned the HTTPS off but would like the extra security when doing
updates and the like.
I have 6
12 matches
Mail list logo