[174951] in North American Network Operators' Group
Re: Marriott wifi blocking
daemon@ATHENA.MIT.EDU (Owen DeLong)
Mon Oct 6 13:16:28 2014
X-Original-To: nanog@nanog.org
From: Owen DeLong <owen@delong.com>
In-Reply-To: <5432B010.1070302@mtcc.com>
Date: Mon, 6 Oct 2014 10:12:18 -0700
To: Michael Thomas <mike@mtcc.com>
Cc: "nanog@nanog.org" <nanog@nanog.org>, Brandon Ross <bross@pobox.com>
Errors-To: nanog-bounces@nanog.org
On Oct 6, 2014, at 8:06 AM, Michael Thomas <mike@mtcc.com> wrote:
> On 10/06/2014 07:37 AM, Owen DeLong wrote:
>> On Oct 4, 2014, at 11:23 PM, Michael Thomas <mike@mtcc.com> wrote:
>>=20
>>> On 10/04/2014 11:13 PM, Owen DeLong wrote:
>>>> Very true. I wasn't talking about ideal solutions. I was talking =
about current state of FCC regulations.
>>>>=20
>>>> Further, you seem to assume a level of control over client behavior =
that is rare in my experience.
>>>>=20
>>>> Owen
>>>>=20
>>> I this particular case, I think that enterprise could go a very long =
way to driving a solution through
>>> standards and deployment. They, after all, call the shots of who =
does and who doesn't get over
>>> the corpro-drawbridge. A much different state of affairs than the =
typical unwashed masses dilemma.
>> Not sure what you mean by corpro-drawbridge in this context.
>>=20
>> Some corporations exercise extreme control over their clients. They =
are the exception, not the rule.
>>=20
>> The vast majority of corporate environments have to face the =
realities of BYOD and minimal control over client configuration, =
software load, etc.
>>=20
>>=20
>=20
> It means that they can exercise control of what they allow on their =
corporate network, byod or not. Nobody
> would allow a WEP-only wireless device on their network these days, so =
it's not hard to imagine that if a standard
> for authenticating AP's became available and enterprises went to the =
effort to upgrade their AP kit, they could
> reasonably say "use a client that supports this, or you must vpn in=94.
I think most environments already support this to some extent in terms =
of the APs participating in the controller framework and 802.1x =
authentication.
However, that doesn=92t cover the guy that brings a linksys in and plugs =
it into his wired port.
I think the only solution for those is detection followed by blocking =
the wired port until resolution. Most companies I have worked with that =
took the time to think this through simply made it an instant firing =
offense for anyone to plug in an unauthorized WAP to the corporate wired =
network, problem solved.
> That's a much better outcome than quibbling about squatter's rights, =
blah blah blah.
To the extent that such is a feasible solution, I think it was long =
since done. That=92s got nothing to do with what this discussion was =
about, however, you=92ve warped it into a completely different problem =
space.
Owen