Good Morning All, We are using the Cisco Unified Wireless solution here at the University of New Mexico. We continue to see a high number of "DeAuthntication Floods" and other IDS signatures being triggered on the wireless system. We are curious to know what others are doing to mitigate these types of attacks? What tools and techniques are being used? Thanks, John V. Duran Network Engineer University of New Mexico Information Technology Services Ph: (505) 249-7890 Fax: (505) 277-8101
********** Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at http://www.educause.edu/groups/.
