Date: Wed, 29 Sep 2004 08:31:34 -0700 From: Kevin Schmidt <kps@ucsb.edu> To: dima <_pppp@mail.ru> Cc: freebsd-net@freebsd.org Subject: Re: Bridging vlans w/firewall and selective HTTP redirect? Message-ID: <200409290831.34763.kps@ucsb.edu> In-Reply-To: <1096458648.2423.11.camel@pppp> References: <200409281010.02904.kps@ucsb.edu> <1096458648.2423.11.camel@pppp>
next in thread | previous in thread | raw e-mail | index | archive | help
On Wednesday 29 September 2004 04:50, dima wrote: > Would you bother reading cisco tech documentation regarding 802.1x? I have. Would you bother dropping invalid assumptions? > http://cisco.com/en/US/products/hw/switches/ps628/products_configuration_gu >ide_chapter09186a008022995b.html It states you can configure guest vlan for > non-authentified users; you can also temporarily disable infected users' > accounts. I'm familiar with Cisco's guest-vlan capability. This is fine if you're using Cisco wireless gear, and it would make part of this exercise easier. A major objective is to implement a solution that is as vendor-independent as possible and maintains similar behavior in wired and wireless environments. There is a variety of existing non-Cisco wired equipment that is capable of 802.1x, but does not have guest-vlan support. -- Kevin Schmidt Campus Network Programmer Office of Information Technology University of California, Santa Barbara North Hall 2124 Santa Barbara, CA 93106-3201 805-893-7779 805-893-5051 FAX kps@ucsb.edu
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200409290831.34763.kps>