RE: Enforcing and Ensuring Machine Auth 802.1x

2009-05-21 Thread Lee H Badman
ACS- has been rock solid (we use it in a fairly simple way) with excellent logs. Tried IAS briefly a few years back, worked, but didn't feel the love with logging details. From: The EDUCAUSE Wireless Issues Constituent Group Listserv

RE: Enforcing and Ensuring Machine Auth 802.1x

2009-05-16 Thread Brooks, Stan
At Emory, we use Machine Auth in our Healthcare organization to authenticate wireless carts in the hospitals. The carts only do machine auth for connectivity; users don't log in to the network - they must use a Citrix session for any work, It's my understanding that Machine Auth is strictly a

RE: Enforcing and Ensuring Machine Auth 802.1x

2009-05-15 Thread Johnson, Neil M
We have similar issues in our library, and haven't found a solution yet. We are a Meru shop. Users attempting to log on to laptops that are members of the domain get Unable to find a logon server errors when the wireless net in the library is being heavily utilized. We are using a Vista