Hello Everyone,

Are there any general recommendations/best practices on rules for misconfigured 
wireless devices for connecting to your wireless infrastructure?  For example, 
we have many mis-configured eduroam clients that are just continually sending 
authentication requests.    We would like to define a rule in our wireless 
infrastructure that says something like, "if the device failed authentication 
20 times in 1 minute, do not allow it to authenticate again for 10 minutes".    
 Has anyone had good or bad experiences with defining these types of policies?

Thank you,

Joe



**********
Replies to EDUCAUSE Community Group emails are sent to the entire community 
list. If you want to reply only to the person who sent the message, copy and 
paste their email address and forward the email reply. Additional participation 
and subscription information can be found at https://www.educause.edu/community

Reply via email to