Good Morning All,
 
We are using the Cisco Unified Wireless solution here at the University of New 
Mexico. We continue to see a high number of "DeAuthntication Floods" and other 
IDS signatures being triggered on the wireless system. We are curious to know 
what others are doing to mitigate these types of attacks? What tools and 
techniques are being used?
 
Thanks,
 
 
 
 
 
 
John V. Duran
Network Engineer 
University of New Mexico
Information Technology Services
Ph: (505) 249-7890
Fax: (505) 277-8101

**********
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.

Reply via email to