Search String: Display: Description: Sort:

Results:

References: [ +subject:/^(?:^\s*(re|sv|fwd|fw)[\[\]\d]*[:>-]+\s*)*\[Karlnet\]\s+virus\s+at\s+customer\s+site\s+hoses\s+entire\s+AP\,\s+any\s+ideas\?\s*$/: 3 ]

Total 3 documents matching your query.

1. [Karlnet] virus at customer site hoses entire AP, any ideas? (score: 1)
Author: "Brett Hays" <bretth@htonline.net>
Date: Thu, 3 Feb 2005 23:10:51 -0500
We have had a couple of situations now where a customer machine will get a Trojan that sends out massive amounts of traffic and bring down every other customer on the same AP. Most recently, it was o
/archives//html/Karlnet/2005-02/msg00004.html (8,344 bytes)

2. Re: [Karlnet] virus at customer site hoses entire AP, any ideas? (score: 1)
Author: "Brett Hays" <bretth@htonline.net>
Date: Fri, 4 Feb 2005 00:07:24 -0500
I think you're right...we use radius for authentication, so the only thing I would be putting on the ap would be the one entry to deny the one customer...probably should have been more descriptive..s
/archives//html/Karlnet/2005-02/msg00005.html (9,857 bytes)

3. Re: [Karlnet] virus at customer site hoses entire AP, any ideas? (score: 1)
Author: "Bob Hrbek" <bhrbek@jagwireless.net>
Date: Thu, 3 Feb 2005 23:05:38 -0600
Yeah, but you can't deny 1 customer w/o explicitly allowing all others....unless I'm missing something on the mac list setup. -Bob -- Original Message -- From: "Brett Hays" <bretth@htonline.net> To:
/archives//html/Karlnet/2005-02/msg00007.html (8,927 bytes)


This search system is powered by Namazu