[134171] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: Public Wireless access (ticket / token / schedule based)

daemon@ATHENA.MIT.EDU (Stefan Fouant)
Tue Dec 28 11:59:19 2010

From: "Stefan Fouant" <sfouant@shortestpathfirst.net>
To: <james@jamesstewartsmith.com>, "'Bill Lewis'" <blewis@hottopic.com>,
	<nanog@nanog.org>
In-Reply-To: <927692545-1293555329-cardhu_decombobulator_blackberry.rim.net-683802757-@bda343.bisx.prod.on.blackberry>
Date: Tue, 28 Dec 2010 11:58:26 -0500
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

> -----Original Message-----
> From: james@jamesstewartsmith.com [mailto:james@jamesstewartsmith.com]
> Sent: Tuesday, December 28, 2010 11:55 AM
> To: Bill Lewis; nanog@nanog.org
> Subject: Re: Public Wireless access (ticket / token / schedule based)
> 
> We've had some good success with the Cisco wireless LAN controllers in
> our office.  The reception staff are given "Lobby Admin" access that
> let's them create users with a default expiry of a day (but can go up
> to 90 days I think). The wireless is technically open, but they can't
> do anything until they authenticate through the controller's web GUI.
> They we have access lists to control what they can do while on the
> wireless.

James,

Just out of curiosity, how does this solution prevent unauthorized users
from gaining access to the system by the aforementioned MAC spoofing
technique?

Stefan Fouant




home help back first fref pref prev next nref lref last post