I assumed you configured your client to explicitly trust the ACS server
certificate. In our setup, only the root intermediate certificates are
configured on the client. We can then update our server certificates without
any issue as long as we continue to use the same certificate chain.
You could get WAPs with external antennas, wall-mount them and then point the
antennas north and south.
-Hector Rios
Louisiana State University
-Original Message-
From: The EDUCAUSE Wireless Issues Constituent Group Listserv
[mailto:WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU] On Behalf Of
From our experience, this is normal. Apple does some caching with its
certificate. If the certificate that is being offered from the server differs,
they appear to complain. From my experience, there is a dialogue box that will
come up on screen telling the users to accept a new certificate.
Thanks Ryan for this information. I am interested to know how products like
CloudPath XpressConnect can make this process seamless to users. If any
XpressConnect customers can elaborate on this, that will be great! Thanks.
---
Dennis Xu
Analyst 3, Network Infrastructure
Computing and
We are a Cloudpath customer. It is not going to help you prevent Apple issues
with certificate changes. It will install all the necessary certificate
chains, as well as provision all client settings. We use EAP-TLS, and it has
made the distribution of certificates a trivial matter. Most
We have also used articulating antennas but in those cases, the antennas
are more apt to be moved from their original position and cause an odd
coverage pattern. That problem seems a lot worse in the Residences and
common areas so admin areas may be better suited for that option.
Ryan Sullivan
About 802.1X installers...
There is a free installer that comes with eduroam that can help automatic
installations:
http://cat.eduroam.org
It works for most OSes except Android (and a client for Android is planned),
and it works for most EAP methods, except EAP-TLS.
It can only be used for the