Mike,

As others have stated, MAC authentication for full network access is not 
considered a best practice.  With the ease of spoofing MAC addresses, it should 
be considered a security risk.

That said, at Emory we DO use MAC auth for users to bypass the captive portal 
for our GUEST network.  Our Guest network is severely restricted (bandwidth 
limited with only web and VPN access).  We implemented the MAC auth bypass last 
fall to accommodate what we call PWD's - Personal Wireless Devices.  These are 
defined as devices can connect to a wireless network, but can't do strong 
authentication.  Some examples are iPhones, PDAs, dual mode cell phones 
(cell/Wi-Fi - like T-Mobile), game consoles, TiVos, etc.  This was implemented 
specifically to support iPhones in the dorms where policy dictates no guest 
access.  While this will be a moot point after July 11th (the iPhone is getting 
an 802.1x supplicate that works very well according to the reports I've heard), 
other devices still need access.  Try telling a dorm resident that they cannot 
connect their TiVo or game console to the wireless network...

While we've built an web app to enter MAC addresses and associated information 
(NetID, type of device, etc.), we restrict its use to a very limited number of 
IT staff.  The registration process is manual in that we need to physically see 
that the device to get its MAC and ensure it is a PWD.  For Move-In Weekend, 
the IT Staff can register devices in the dorms.  During the school year, 
students must bring their devices to the clean room to get them registered.  We 
have a lot of iPod Touches registered in January - I guess it was a popular 
Christmas gift.

The PWDs have a very restrictive role on the network, similar to our guest 
access role.  Since we know what the device is and who owns it, we do open some 
additional ports such as secure mail and TiVo support.  We eventually want to 
put different devices in specific roles; iPhones get different roles from TiVos 
or game consoles.  That enhancement will be completed when I have time - may be 
this fall.

Let me know if you have any questions...

 >>-> Stan Brooks - CWNA/CWSP
      Emory University
      Network Communications Division
      404.727.0226
AIM/Y!/Twitter: WLANstan
           MSN: [EMAIL PROTECTED]
    GoogleTalk: [EMAIL PROTECTED]


-----Original Message-----
From: The EDUCAUSE Wireless Issues Constituent Group Listserv [mailto:[EMAIL 
PROTECTED] On Behalf Of Michael Dickson
Sent: Tuesday, July 01, 2008 9:58 AM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: [WIRELESS-LAN] Using MAC Authentication

We are considering using MAC authentication to allow users to bypass the
captive portal web login page to access our wireless network. This is
considered sort of a stop-gap measure until 802.1x is fully implemented.

Is anyone maintaining (by harvesting or user-initiated manual entry) a
MAC auth table after initial captive portal login so that users can
bypass the web login page every time they connect?

We are considering a manual opt-in process instead of an auto-harvest
and we would not harvest MAC addresses of folks with guest accounts.

Is this generally a good idea? What is the down side of not making users
sign in every session?

As an aside, we are considering extending the dhcp lease times and the
reauth intervals so that users don't have to log in again if they walk
to class from their dorms, etc.

We are an Aruba shop. We currently have an open SSID, no encryption,
with captive portal as the only point of authentication. 802.1x rollout
expected soon.

As always, thanks for the help!

Mike

***************************************************************
Michael Dickson                     Phone: 413-545-9639
Network Analyst                     [EMAIL PROTECTED]
University of Massachusetts
Network Systems and Services
***************************************************************

**********
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.

This e-mail message (including any attachments) is for the sole use of
the intended recipient(s) and may contain confidential and privileged
information.  If the reader of this message is not the intended
recipient, you are hereby notified that any dissemination, distribution
or copying of this message (including any attachments) is strictly
prohibited.

If you have received this message in error, please contact
the sender by reply e-mail message and destroy all copies of the
original message (including attachments).

**********
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.

Reply via email to