Solved

Cisco WCS Iphones taking all IP's!

Posted on 2011-09-07
4
439 Views
Last Modified: 2013-12-27
Our guest wireless (public broadcast) is leasing all 510 IP's to Iphones, Itouches, etc.. Lease time is set to 1 hr which is bad for the network and isn't working at this point.

Mac filtering isn't really an option. Unless its by denying the vendors MAC.. Is that possible?

What are common practices for guest wireless DHCP issues?
Thanks!
0
Comment
Question by:PapaSmurff
  • 2
  • 2
4 Comments
 
LVL 3

Accepted Solution

by:
rog2054 earned 500 total points
ID: 36510104
Hi.

We had the same problem.

At first we increased the size of the DHCP pool - obviously this was only a temporary fix!

After that, as a slightly more effective solution (but still temporary), we have added a WEP key onto the guest wireless. As this is in a corpoarte environment, the WEP key is given freely to visitors upon their arrival to reception.
Once connected to the guest network, visitors then have to authenticate via a web page (Cisco WebAuth) before they actually get internet access. User logons for this are created on-demand by our internal IT Service Desk, and auto-expire after 24 hours. This gives us some idea who is using the guest network, as well as reassurance that they can only use it for a set period before it needs re-requesting (which keeps our Security guys happy).

As a more long-term solution, we're investigating/testing if Windows 2008 NPS can be used, as that can grant/deny based on OS etc - ie only allow Windows 7 and XP in this scenario. Our wireless controller can query the NPS Server (it currently does so to authenticate staff to our Staff Wifi using AD accounts, so should be an option.)

Another idea is to create a mac-blacklist, thereby allowing all except xxx yyy mac addresses. Over a relatively short period of time this could be created by collecting the MACs of all iphones etc which connect. (chances are the majority will be the same iphones every day). Obviously there is a manual element to this approach, so it may not be ideal depending on the scale of your wireless.

Hope this helps. I too would be interested to hear what other people are doing to combat this issue.
0
 

Author Comment

by:PapaSmurff
ID: 36718536
I've requested that this question be deleted for the following reason:

No answer given.
0
 
LVL 3

Expert Comment

by:rog2054
ID: 36718537
I gave several suggestions as to what we do, and other avenues we are looking into.
- Doesn't this count as an answer (or at least a partial one)?
0
 

Author Closing Comment

by:PapaSmurff
ID: 36718564
can only blacklist unique MAC's.
Thanks for answering.
0

Featured Post

Free learning courses: Active Directory Deep Dive

Get a firm grasp on your IT environment when you learn Active Directory best practices with Veeam! Watch all, or choose any amount, of this three-part webinar series to improve your skills. From the basics to virtualization and backup, we got you covered.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Setting up a Win 2008 R2 Radius Server for wireless authentication 5 58
Wifi Access 4 65
Wifi install - small London office 9 131
Printer Functions erratically 5 65
Tired of waiting for your show or movie to load?  Are buffering issues a constant problem with your internet connection?  Check this article out to see if these simple adjustments are the solution for you.
In this article we have discussed about the OS X EI Capitan and how to fix Wi-Fi issue in OS X El Capitan. We have explained how to delete system level preferences and create a new Wi-Fi location to resolve Wi-Fi issue.
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…

856 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question