Comments
 
At a client running a Trapeze/Juniper network with some MX-8 controllers, a bunch of MP-371B and an instance of Ringmaster software to control and configure it all, we were working on implementing MAC-address based authentication for one of their ESSIDs. After correctly setting up the necessary policies, and AAA servers, we noticed that any client could still connect to our network, despite all settings being correct.

Baffled at this, we started to look around, trying to figure out what went wrong. My collegue finally remembered the true cause for our problem, a setting in the Wireless Service Profile.

There, the Fall Through Access was set to last resort, which basically tells the network  ...
Add a new comment
 
Your name:
Your e-mail:
Your comment:
 
Basic BBcode is supported.
Captcha:
Type the letters and numbers as shown.
/get/captcha/1714841997
Not readable? Get another.
 
 
 
 
« May 2024»
SunMonTueWedThuFriSat
   1234
567891011
12131415161718
19202122232425
262728293031
 
Links
 
Quote
« Debating Windows vs. Linux vs. Mac is pointless: they all have their merits and flaws, and it ultimately comes to down to personal preference. »
Me