We tracked one down yesterday and it turned out to be a Windows Mobile
phone running Android. Decidedly not a MAC.. :)
-JEff
On 9/28/10 10:44 AM, Andrew Clark wrote:
I'm seeing them here at the University of Minnesota as well. Thanks
for the heads-up! I'll see what I can discover once I
On 9/27/10 11:26 AM, John Duran wrote:
We are also seeing a client with that MAC address (00:11:22:33:44:55) on
our system.
Just a sanity check here, since most management systems seem to use MAC
address as a primary key, it's likely you'll only 'see' one
00:11:22:33:44:55
http://code.google.com/apis/maps/documentation/javascript/overlays.html#OverlaysOverview
My speculation is that they probably already have their building
footprints as overlay objects, so it's comparatively easy to add another
layer that depicts buildings covered by wireless.
-JEff
On
On 4/7/10 12:01 PM, Lee H Badman wrote:
In response to Apple’s guidance, we’ve given out the user name and
password to our wireless management system so IPad users can configure
our access points as they need to fix their connectivity problems.
I assume you're also handing out stepladders and
Bentley, Douglas wrote:
We had quite a few issues moving forward with 4.2.62. If you have configuration issues after upgrading to 4.2.62 - DON'T - try to load a backup config file from 4.xxx code to the new 4.2.62 WLCs. I made this error and put 5 - WLCs (2.5 WiSMs) back to the install wizard.
Julian Y. Koh wrote:
We're only seeing these unknown records from a little over 10% of our APs,
and some of them are generating thousands of the records, so longer-term, of
course, we need to exercise some better RF management so that users don't
roam as often.But that's another exercise
Julian Y. Koh wrote:
At 20:15 -0500 06/02/2006, Julian Y. Koh wrote:
Now we find out from Funk that their fix in 5.4 still isn't working like they
wanted, with a final fix scheduled for Q4 2006. This is obviously totally
not cool, and will probably force us to jumpstart our freeradius
Wyman Miles wrote:
We're about to pilot an 802.1x project for one of the larger departments on
campus and I had a few questions for the universities who've gone before:
- is anyone using Kerberos as an authentication resource for your wireless
clients. Any pitfalls? Did you have to
Philippe Hanset wrote:
Don,
A trick that I have been willing to test for a long time would be
to join the Rogue AP, send traffic to a know sniffing host
in that same layer2 network.
This will reveal the Wired MAC address of the AP.
Then search for that MAC on your wired side and disable the port.
John Watters wrote:
Where can we find a good list of the MAC address ranges for wireless access
points? If I just look
by manufacturer (see http://standards.ieee.org/regauth/oui/index.shtml) I do
not see a distinction
between their access points their NICs, switches, routers, and other network
10 matches
Mail list logo