On Tue, 6 Dec 2005, Marlon K. Schafer (509) 982-2181 wrote:

Yeah, until some lunkhead plugs his dsl router in backward. As they do all the time around here....

Mikrotik has a builtin option that will discover rogue DHCP servers. It will identify the MAC addy of the rogue server. A simple removal (or identification of) that MAC from the ACL on the tower will eliminate this as an issue.

--
Butch Evans
BPS Networks  http://www.bpsnetworks.com/
Bernie, MO
Mikrotik Certified Consultant
(http://www.mikrotik.com/consultants.html)
--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/

Reply via email to