How does the user tracking work with pat? usually when we get a dmca  
or virus or spam it doesn't come with a port?

Sent from my iPhone

Jason Appah
Systems Administrator
Oregon Tech

On Dec 14, 2009, at 6:09 PM, "Hector J Rios" <[email protected]> wrote:

> Lee,
>
> We use private IPs, we PAT at the border and we log all transactions  
> on
> a Juniper firewall so that we can keep a log of the private-to-public
> translations. We keep 30 days of logs right now. We are buying more  
> disk
> space to save up to 90 days.
>
> It's been very effective. As a side note, we would not be able to
> maintain our wireless if we did not have a private IP space. Just this
> semester we had to increase the IP subnet for our library. On finals
> week we saw over 800 users!!
>
> Thanks,
>
> Hector Rios
> Louisiana State University
>
> -----Original Message-----
> From: The EDUCAUSE Wireless Issues Constituent Group Listserv
> [mailto:[email protected]] On Behalf Of Lee H Badman
> Sent: Monday, December 14, 2009 7:55 PM
> To: [email protected]
> Subject: [WIRELESS-LAN] Private IP space for wireless users- anyone?
>
> Wondering how many other schools are using private IP space for
> wireless users, how you accomplish the NAT, and what mechanisms you  
> use
> for user tracking for the private-public mappings for
> forensic/investigatory purposes.
>
> Thanks-
>
> Lee
> **********
> Participation and subscription information for this EDUCAUSE  
> Constituent
> Group discussion list can be found at http://www.educause.edu/groups/.
>
> **********
> Participation and subscription information for this EDUCAUSE  
> Constituent Group discussion list can be found at 
> http://www.educause.edu/groups/ 
> .

**********
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.

Reply via email to