Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 29 Sep 2004 08:31:34 -0700
From:      Kevin Schmidt <kps@ucsb.edu>
To:        dima <_pppp@mail.ru>
Cc:        freebsd-net@freebsd.org
Subject:   Re: Bridging vlans w/firewall and selective HTTP redirect?
Message-ID:  <200409290831.34763.kps@ucsb.edu>
In-Reply-To: <1096458648.2423.11.camel@pppp>
References:  <200409281010.02904.kps@ucsb.edu> <1096458648.2423.11.camel@pppp>

next in thread | previous in thread | raw e-mail | index | archive | help
On Wednesday 29 September 2004 04:50, dima wrote:
> Would you bother reading cisco tech documentation regarding 802.1x?

I have.  Would you bother dropping invalid assumptions?

> http://cisco.com/en/US/products/hw/switches/ps628/products_configuration_gu
>ide_chapter09186a008022995b.html It states you can configure guest vlan for
> non-authentified users; you can also temporarily disable infected users'
> accounts.

I'm familiar with Cisco's guest-vlan capability.  This is fine if you're using 
Cisco wireless gear, and it would make part of this exercise easier.  A major 
objective is to implement a solution that is as vendor-independent as 
possible and maintains similar behavior in wired and wireless environments.  
There is a variety of existing non-Cisco wired equipment that is capable of 
802.1x, but does not have guest-vlan support.

-- 
Kevin Schmidt
Campus Network Programmer
Office of Information Technology
University of California, Santa Barbara
North Hall 2124
Santa Barbara, CA 93106-3201
805-893-7779
805-893-5051 FAX
kps@ucsb.edu



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200409290831.34763.kps>