Refine

Filter by content author

Filter by post date:

Network Technology & Infrastructure community blogs

Clear filters
    Blog
    Community

    Are we bypassing policy by using mac-address authorisation for devices that cannot do 802.1x or can but don't have a university username? Personally I don't think so.

     

    We record the owner of the device and therefore have an auditable record of where the device authenticated by storing the mac-address in a mac-authorisation bypass file on the RADIUS Servers. This writes a log entry for all login attempts. After successful authentication and the...