ailto:wireless-...@listserv.educause.edu] On Behalf Of Jethro R Binks
Sent: Friday, April 16, 2010 4:46 AM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: Re: [WIRELESS-LAN] Hacking Cisco WLC - macfilters
On Thu, 15 Apr 2010, Brooks, Stan wrote:
> Our system uses Mac-Auth via RADIUS. We've built a
>
, April 16, 2010 9:06 AM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: Re: [WIRELESS-LAN] Hacking Cisco WLC - macfilters
I would be interested in the code from a curiosity perspective, but I also
wanted to ask how this is received from a user perspective.
Is this a feature that you use as a l
PM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: Re: [WIRELESS-LAN] Hacking Cisco WLC - macfilters
Mike,
I manage Cisco controller exclusions via SNMP.
We have a homegrown IPAM system which includes a checkbox to be able to disable
a machine.
Doing so for a wireless host causes this to create
[mailto:wireless-...@listserv.educause.edu] On Behalf Of Jethro R Binks
Sent: Friday, April 16, 2010 3:46 AM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: Re: [WIRELESS-LAN] Hacking Cisco WLC - macfilters
On Thu, 15 Apr 2010, Brooks, Stan wrote:
> Our system uses Mac-Auth via RADIUS. We've built a cu
On Thu, 15 Apr 2010, Brooks, Stan wrote:
> Our system uses Mac-Auth via RADIUS. We've built a
> custom web app in house that updates the RADIUS auth database so trusted
> people (some of our clean room techs and others) can verify the type of
> device and enter the MAC into the system.
Other
SE Wireless Issues Constituent Group Listserv
[mailto:wireless-...@listserv.educause.edu] On Behalf Of Schomer, Michael J.
Sent: Thursday, April 15, 2010 10:45 AM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: [WIRELESS-LAN] Hacking Cisco WLC - macfilters
Although we encourage all wireless devices to