On Tue, 6 Dec 2005, Marlon K. Schafer (509) 982-2181 wrote:
Yeah, until some lunkhead plugs his dsl router in backward. As they do all the time around here....
Mikrotik has a builtin option that will discover rogue DHCP servers. It will identify the MAC addy of the rogue server. A simple removal (or identification of) that MAC from the ACL on the tower will eliminate this as an issue.
-- Butch Evans BPS Networks http://www.bpsnetworks.com/ Bernie, MO Mikrotik Certified Consultant (http://www.mikrotik.com/consultants.html) -- WISPA Wireless List: email@example.com Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/