Results 1 to 4 of 4

Thread: Unauthorized Apple iPODs and MAC notebooks connect to my wireless network

  1. #1
    Join Date
    Aug 2010
    Posts
    55

    Unauthorized Apple iPODs and MAC notebooks connect to my wireless network

    Hi,
    the server which i use is of the Server 2003 IAS Sever,where the Enterprise Certificate Services are installed on the laptop,the problem which is faced is about the unauthorized ipods and the mac notebook gets connected to the wireless network, these is possible only if the valid username and password is available to client,so please help to solve this issue.

  2. #2
    Join Date
    Nov 2005
    Posts
    2,483

    Re: Unauthorized Apple iPODs and MAC notebooks connect to my wireless network

    The problem for the unauthorized users getting connected to your wireless network,so i would like to inform you that windows client to use the computer authentication in place of using the users authentication after the login, it is even possible to remove users accounts from unauthorized users.

  3. #3
    Join Date
    Apr 2008
    Posts
    2,347

    Re: Unauthorized Apple iPODs and MAC notebooks connect to my wireless network

    The prevention of the unauthorized users to your wireless network is possible, so some of the tactics should be applied so that such users can be detected,so to prevent it use of strong passwords should be recommended, the use of the wireless tool should be made which detects the users,the Zamzom Wireless network tool is the one which may detect all computer names, ip and mac addresses which are using this wireless network.

  4. #4
    Join Date
    Apr 2009
    Posts
    825

    Re: Unauthorized Apple iPODs and MAC notebooks connect to my wireless network

    As you would like to keep your wireless network safe from the unauthorized users like ipods and mac notebooks,check whether the certificates which are installed on the client machine consists the private keys of their machines, make sure if use of EAP-MSCHAPv2 or PEAP-MSCHAPv2 should not be done,you may be recommended to make use of the PEAP-TLS.Because the PEAP-MSCHAPv2 use for Server authentication whereas the PEAP-TLS uses certificates for both Server and Client authentication.

Similar Threads

  1. Replies: 11
    Last Post: 27-12-2011, 10:38 PM
  2. Replies: 9
    Last Post: 01-10-2011, 12:14 AM
  3. Replies: 4
    Last Post: 12-08-2011, 09:42 AM
  4. Which is the best among these Top 10 Apple iPods?
    By Samra in forum Polls & Voting
    Replies: 1
    Last Post: 06-01-2009, 01:00 PM
  5. Apple launches special red edition iPods
    By Rebeccak in forum Portable Devices
    Replies: 0
    Last Post: 23-12-2008, 06:15 PM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Page generated in 1,713,544,635.20200 seconds with 17 queries