Nick,
You want to keep the amount of SSID's flying around as low as possible.
Why?
http://revolutionwifi.blogspot.com/2010/10/limit-ssids-data-rates-to-maintain.html?spref=tw
My 2 cents
Best regards, Kees.
Netwerkbeheer
Avans Hogeschool
Diensteenheid ICT en Facilitaire Dienst (DIF) -
On Mon, 19 Sep 2011, Lee H Badman wrote:
At the risk of being seen as shameless in self-promotion, I just wrote a
brief piece about Extreme Networks Snap On WiFi (built on Motorola
under the hood) Altitude 4511. If you buy into the philosophy, and under
the right conditions I would, no
Lee this is a really interesting article, and something we've been
looking at as a UK Extreme networks customer. Have you experienced
rolling these out to a dorm yet, as I'm quite interested to find out how
low the DBI output can be dropped to, to see if is it practical to
install 1 per room (with
Hi Peter,
I cannot stand behind the 4511 from experience at Syracuse University, as we
are a very large Cisco lightweight wireless environment (with a 35 AP Meraki
deployment in our London facility). I covered the 4511 as the wireless/mobility
blogger for Network Computing, where I have the
Dennis,
How does that work? The two servers have different hostnames DNS entries, I
assume.
I do not think it would work in our NPS environment anyway. Our NPS servers are
also Read-Only Domain Controllers (each in their own site). This removes the
RADIUS server load from our production
On 09/20/2011 04:06 AM, Jethro R Binks wrote:
My other concern is for those cases where you have a mix of wifi
vendor technologies. For example you might like this Motorola
product in some deployments, but otherwise be running C-word wireless
or A-word wireless. Or perhaps with T-word
The dorms are a lose-lose situation. We have 100% coverage, but the dorms
require more support than any other buildings, when things don't work (it's
Wireless, after all) we get flooded with calls (especially from mommy and
daddy) AND then the students bring in their own devices (against the
We have gone the route of enhancing our wireless in the dorms. Our dorms
hold approx. 125+ students per bldg. We provide wired - 100mB and
Gigabit as well as wireless. We've upgraded our APs to increase coverage
every year including this year. The replacing of the Ciscos to Ruckus
has resulted
I do this. In the certificate the common name is Auth.central.edu. Then I
have auth2 and auth3 listed as additional names on the certificate. I have the
certificate installed on both servers and auth points to both servers. With
server 2008R2 I also disable strict name checking.
Thank you,
On 20/09/2011 12:19, Osborne, Bruce W wrote:
-Original Message-
From: Dennis Xu [mailto:d...@uoguelph.ca]
Sent: Monday, September 19, 2011 3:04 PM
Subject: Re: Issue with Microsoft NPS certs and ipads/iphones
We use the same certificate on two ACS servers for PEAP authentication to
Bruce,
The certificate is used for 802.1x authentication only, not for management
access or other purposes. As I understand, PEAP authentications do not bother
with server's hostnames and DNS. It happens before clients get IP address. But
if your certificate is used for other purposes, this
Our rogue DHCP server problems went away once we started blocking DHCP offers
at the edge. Before that we were hooking protocol analyzers up to the segment
having problems to detect rogues.
Jason Todd
Network Security Officer
Western University of Health Sciences
From: The EDUCAUSE Wireless
We'll be replacing our switches over the next 6-18 months, and I'm hoping
the new ones may include this capability.
David Gillett
_
From: Jason Todd [mailto:jt...@westernu.edu]
Sent: Tuesday, September 20, 2011 08:06
To: WIRELESS-LAN@listserv.educause.edu
Subject: Re: [WIRELESS-LAN]
On 9/20/2011 11:52 AM, David Gillett wrote:
We'll be replacing our switches over the next 6-18 months, and I'm hoping
the new
ones may include this capability.
Just be a bit cautious... our city buses offer free WiFi on board. We were
deauth-ing
/ dropping users on the buses when they
We are using the last version of this script:
https://roguedetect.bountysource.com/
It's pretty old but works for us. We may have made some minor changes for
our environment. I think mainly the script would only email the mac, and i
modified it to also report the interface/vlan. Each of our 22
The state mandates a competitive bidding process, so it will be some time
before I know the vendor, let alone the model.
We're far enough into the process that I probably can't get this added to
our list of required functionality. I just have to hope it has become a
common enough feature
Most enterprise class equipment (Cisco, Brocade, etc) come with
dhcp-snooping standard now. Not sure about Juniper, and I think I heard
the HP does it.
I have DHCP-Snooping up in all student areas.
Heath
On 9/20/2011 11:16 AM, David Gillett wrote:
The state mandates a competitive bidding
I can confirm Juniper does it.
On Tue, Sep 20, 2011 at 5:47 PM, Heath Barnhart heath.barnh...@washburn.edu
wrote:
Most enterprise class equipment (Cisco, Brocade, etc) come with
dhcp-snooping standard now. Not sure about Juniper, and I think I heard the
HP does it.
I have DHCP-Snooping up
18 matches
Mail list logo