Hello Everyone, Are there any general recommendations/best practices on rules for misconfigured wireless devices for connecting to your wireless infrastructure? For example, we have many mis-configured eduroam clients that are just continually sending authentication requests. We would like to define a rule in our wireless infrastructure that says something like, "if the device failed authentication 20 times in 1 minute, do not allow it to authenticate again for 10 minutes". Has anyone had good or bad experiences with defining these types of policies?
Thank you, Joe ********** Replies to EDUCAUSE Community Group emails are sent to the entire community list. If you want to reply only to the person who sent the message, copy and paste their email address and forward the email reply. Additional participation and subscription information can be found at https://www.educause.edu/community
