Comments
 
At a client running a Trapeze/Juniper network with some MX-8 controllers, a bunch of MP-371B and an instance of Ringmaster software to control and configure it all, we were working on implementing MAC-address based authentication for one of their ESSIDs. After correctly setting up the necessary policies, and AAA servers, we noticed that any client could still connect to our network, despite all settings being correct.

Baffled at this, we started to look around, trying to figure out what went wrong. My collegue finally remembered the true cause for our problem, a setting in the Wireless Service Profile.

There, the Fall Through Access was set to last resort, which basically tells the network  ...
Add a new comment
 
Your name:
Your e-mail:
Your comment:
 
Basic BBcode is supported.
Captcha:
Type the letters and numbers as shown.
/get/captcha/1730420178
Not readable? Get another.
 
 
 
 
« November 2024»
SunMonTueWedThuFriSat
     12
3456789
10111213141516
17181920212223
24252627282930
 
Links
 
Quote
« Debating Windows vs. Linux vs. Mac is pointless: they all have their merits and flaws, and it ultimately comes to down to personal preference. »
Me