How to Block LAP1242 AG connect WLC

Hi Friends,
Did you meet this issues that the remote site (US) AP 1242 always connect to our site(ASIA) WLC 5508 (maybe some DHCP configure caused when troubleshooting, right nowDHCP back to normal. only enable vendor and option 43 for 1262 and 3602, no option 43 for 1242), but now we cannot block these AP1242 to join our site 5508 WLC. even I reset the 1242 AP to default configure from WLC GUI and CLI , but it's still there in a mins.
Since in our site Core SW, Router cannot find these AP mac address, and also those AP not the IP address in the WLC GUI and CLI . SO we don't know where it is?  can you pls help?

Well that is how to block APs from joining:). If you know these APs have to join a specific WLC, then create a dhcp option 43 for these APs or temporarily create a DNS entry for these APs to join the WLC it is suppose to. You can't just block these APs from joining if you have mo ility between the WLCs and or if your using option 43 and or DNS that helps these APs join the WLC. So now what your stuck with is making these join the right WLC. When you do that, then remove all your option 43 from dhcp and disable the DNS so none of the APs will be able to join the wrong WLC.
Sent from Cisco Technical Support iPhone App

Similar Messages

  • How to block mobile devices connected to internal Wi-Fi networks on Lync 2013

    How to block mobile devices connected to internal Wi-Fi networks on Lync 2013.
    we don't have lyncdiscoverinternal.contoso.com and lyncdiscover.contoso.com in internal DNS record, all mobile users are connecting from Internet, and we want it to be that way.
    So if I create the lyncdiscoverinternal.contoso.com record for Windows desktop clients autodiscover, how do I block internal mobile users from connecting to Lync??
    Praveen | MCSE Messaging 2003

    Hi Praveen,
    Based on my experience, one way to achieve this purpose you need to use the Reverse Proxy that is integrate with a Firewall (e.g. TMG 2010 , F5, etc…).
    Please have a look at the following picture.
    In Lync Server 2013,
    both the internal Mobility Service URL and the external Mobility Service URL are associated with the external Web Services FQDN.
     From the above picture, if you use a reverse proxy that is
    separate from the firewall, then the hairpin will be created,
     and cause the mobile client which connected to the internal Wifi will be able to
     access the external interface of the Reverse Proxy.
    In this situation, the mobile client which from Internet will not be effected.
    Best regards,
    Eric
    Please remember to mark the replies as answers if they help, and unmark the answers if they provide no help. If you have feedback for TechNet Support, contact [email protected]

  • RV 120W:How to block device from connected to interner through device name?

                       Hi guys,
    i am using the router,rv 120w
    can i block device from connected to internet through device name?
    for example,the Android Phone wil always has "android" in their device name.How can i block the device which has "android" in their device name from link to internet?
    Thanks.

    Good morning
    Thanks for using our forum
    Hi Louis, my name is Johnnatan and I am part of the Small business Support community. You can´t block any device by the name, however you can block devices using it mac-address. Go Firewall> Access Control>Mac Filtering in this section you can specify the mac address of  the devices and block them.
    I hope you find this answer useful,
    *Please mark the question as Answered or rate it so other users can benefit from it"
    Greetings,
    Johnnatan Rodriguez Miranda.
    Cisco Network Support Engineer.

  • WLC - How to block a single client MAC address?

    Hi Sir,
    On a WLC (software version 4.1.185.0), how to block a single client MAC address?
    I thought of using the SECURITY -> Disabled Clients. Is it right?
    There are currently 250 users connected to the WLC. MAC Filtering is not a scalable solution because as I understand it, we have to specify all the legitimate MAC addresses in the local database.
    Thank you.
    B.Rgds,
    Lim TS

    Hi Lim,
    As you have discovered, the Mac filtering on the WLC is an Allow (based on Mac address) rather than what you need which is a Deny (based on Mac address). I have not tried this feature but I think you are on the right track in using the Exclusion List (Blacklist) feature. Have a look;
    Use SECURITY > AAA > Disabled Client then click New or MONITOR > Clients then click Disable to navigate to this page.
    This page allows you to manually Exclusion List (blacklist) a client by MAC address.
    Add the MAC Address and an optional Client Description for the client to be disabled.
    Note When you enter a client MAC address to be disabled, the Operating System checks that the MAC address is not one of the known Local Net clients ( Local Net Users), Authorized clients ( MAC Filtering), or Local Management users ( Local Management Users) MAC addresses. If the entered MAC address is on one of these three lists, the Operating System does not allow the MAC address to be manually disabled.
    Hope this helps! Let us know.
    Rob

  • OSX ML firewall is blocking smtp/imap connection to the server. how can i enable it without turning off the firewall?

    With the firewall turned on and with the "block all incoming connections" option untick, I can send email to internal and external addressee. However,
    1. Mail clients both from LAN and from outside (WAN connected) could not connect to the mail server. Both SMTP and IMAP could not connect to the server.
    2. External MTA (say from google or yahoo MX server) could not connect to the server too.
    both of these issues are resolved if I set the firewall to OFF. Is there a workaround without turning this off? appreciate your input/advise..

    I've used Mail on Exchange and Gmail with the firewall on for send/recieve on my Mac no problem there.
    However,  are you asking about the MacServer? If so, you're in the wrong section...
    Remember how public-facing systems work, they have to be universally accessible directly or through a DMZ zone in the firewall/gateway. This means the firewall/gateway has to be upstream from the server, not directly on the server.
    Also, check your DNS settings on the computers and server both inside and outside the network.

  • I need to know how to block the option menu on firefox because my students change the connection option bypassing the proxy that should block them when it's not alloud surf on the web. Thank's

    I need to know how to block the option menu on firefox because my students are able to change the connection option bypassing the proxy that should block them when it's not alloud surf on the web. Thank's

    See http://kb.mozillazine.org/Locking_preferences
    <code>//
    lockPref("network.proxy.type", 1);
    lockPref("network.proxy.http", "");
    lockPref("network.proxy.http_port", "");
    </code>
    See:
    http://kb.mozillazine.org/network.proxy.type
    http://kb.mozillazine.org/network.proxy.%28protocol%29
    http://kb.mozillazine.org/network.proxy.%28protocol%29_port

  • How to block internet connection for a period of time?

    Hey guys is there a way to block internet connection via a lan connection for a period of time? A program that when my pc is boot up it run secretly and at the time schedule it block the internet connection with no pop up. When i not at home some person
    used my pc to use my internet connection everyday. I can't lock up my pc since my brother or my dad used it.
     

    Hi,
    You could create a schedule task to achieve this.
    The detailed solution please refer to this thread:
    https://social.technet.microsoft.com/Forums/en-US/7544cbed-507d-4eef-907d-bafb99b45411/disable-internet-for-a-set-period-of-time?forum=w7itprogeneral
    Karen Hu
    TechNet Community Support

  • How to block my iphone5?

    how to block my iphone5?

    Lost? Stolen?
    The only way to locate/disable/erase any lost/stolen iPhone/iPod Touch is through Find My Phone or a similar app. However, this requires that Find My Phone be setup/activated, on your phone, before it was lost/stolen. You would then login at iCloud.com & try to locate it. This requires the phone be turned on & have an Internet connection. There is no other way to locate a lost/stolen iPhone. Apple can't/won't help you, nor will your carrier. Report the loss to the Police, your carrier & Insurance company. Change all of your passwords, especially your Apple ID/iCloud password NOW!
    If your carrier offers Blacklisting & they Blacklist the phone, it will be unusable as a phone.
    If locked with a passcode, and running iOS 7.0, then phone cannot be activated or the passcode removed without knowing your Apple iD/Password. It will be nothing but a useless paperweight.
    If not running iOS 7.0, the phone can be forced into recovery mode & restored.

  • How to block all goods movements incurs to a warehouse?

    Hi all,
    I am wondering if you can provide me a way, a transaction code on how to perform the following?
    How to block all goods movements incurs to a warehouse.
    I am trying to execute LX23 (Stock comparison IM/WM) and try to remove the differences using batch input file.
    SAP document indicates the prerequisite to use this feature is that all inventory movements to the warehouse be blocked before clearing the differences (i.e. adapt the IM figure to that of WM figure).
    Appreciates.
    Daniel

    I think the requirement here is to block inventory movement (GR, GI, PCN etc.) to storage locations which are connected to your warehouse. Blocking movement on storage types in your warehouse does not serve this purpose.
    Is it really necessary to block inventory movement when running LX2? LX23 eventually will need to correct the stock via IM posting at the end.
    Anyway, if storage location level authorisation check is not currently in use in your system (OLMB -> Authorisation Management -> Authorisation check on storage location), you may try to activate authorisation check on storage locations connected to your warehouse so that those who has no M_MSEG_LGO assigned won't be able to post inventory movement to the warehouse.

  • Unwanted websites appear automaticly, some are detected malware with my antivirus program, how to block this

    unwanted websites connect automatically without clicking anything, mainly survey requests and some are blocked as dangerous by my antivirus program How can I avoid this connections.

    Do a malware check with some malware scanning programs on the Windows computer.<br>
    Please scan with all programs because each program detects different malware.
    Make sure that you update each program to get the latest version of their databases before doing a scan.
    *Malwarebytes' Anti-Malware:<br>http://www.malwarebytes.org/mbam.php
    *SuperAntispyware:<br>http://www.superantispyware.com/
    *Microsoft Safety Scanner:<br>http://www.microsoft.com/security/scanner/en-us/default.aspx
    *Windows Defender: Home Page:<br>http://www.microsoft.com/windows/products/winfamily/defender/default.mspx
    *Spybot Search & Destroy:<br>http://www.safer-networking.org/en/index.html
    *AdwCleaner:<br>http://www.bleepingcomputer.com/download/adwcleaner/<br>http://www.softpedia.com/get/Antivirus/Removal-Tools/AdwCleaner.shtml
    *Kasperky Free Security Scan:<br>http://www.kaspersky.com/security-scan
    You can also do a check for a rootkit infection with TDSSKiller.
    *Anti-rootkit utility TDSSKiller:<br>http://support.kaspersky.com/5350?el=88446
    See also:
    *"Spyware on Windows": http://kb.mozillazine.org/Popups_not_blocked

  • How to block p2p applications(Bittorent like) with AIP-SSM-10?

    Hi,
    How to block p2p application using AIP-SSM-10 working with ASA5520?AIP is on promiscuous mode.
    Thanks,
    Siva

    There are several signatures that detect p2p, for bit torrent there is 11020.0
    Yahoo triggers: 5539.0, 11200.0, 11212.0, 11217.0 & 11219.0
    etc..
    Some are disabled by default though so please ensure you enable the ones that you need.
    If you want to block these then you will have to use event actions that work in promiscuous setup for example request block connection and tcp reset. Please note that care must be taken when using these event actions.
    For more information about the event actions please refer the link below:
    http://www.cisco.com/univercd/cc/td/doc/product/iaabu/csids/csids12/idmguide/dmevtrul.htm#wp1069467

  • How many number of database connections used in a transaction

    Hi All,
    We are using weblogic 8.1 with Oracle 9i both running on windows 2000. We are trying to estimate the potential resource usage in the system we are building. As part of this activity we want to find out how the database connections are used for entity beans -
    If a session bean calls more than one entity beans
    (each method in the entity bean doing one update) does weblogic use the same database connection for all the entity beans or does it use seperate connections ? Is such behaviour documented somewhere ?
    Here the assumption is all the entity beans are linked to the same datasource.
    If the (default) behaviour is to use seperate connections is there a way to make it use one connection across multiple entity beans.
    Thanks
    Kingshuk

    Hi Bodapati,
    Sorry for the delay in replying to this.
    There is optimization, which will use the XA
    connections from the pool. Can you tell me what your
    observations are? I may be able to see if we can tune it.From our tests the XA driver too appear to make use of one connection only for the life of the transaction. There is a good document here explaining how it is ensured that only one connection is used - http://e-docs.bea.com/wls/docs81/oracle/trxjdbcx.html#1083132
    Quoting from the above URL :
    When a thread attempts to use a connection, the XA jDriver calls xa_open (and xa_start) to create the connection and associate it with the thread. After the database connection is created, the connection remains associated with the thread; the driver does not call xa_close. When the thread subsequently needs a database connection, it uses the same database connection associated with it, even though it appears to get and return a connection from the JDBC connection pool
    I am not sure why you say the connections will be
    blocked. One connection will be blocked only if you are > using non-XA driver to setup the pool, until the
    transaction commits. For XA there is no need to reserve
    the same connection for the transaction.Probably my understanding on this is incorrect and I need to read up. I was under the impression that - once a transaction begins, each connection used within that transaction, is enlisted as a part of that transaction and can not be used by in another transaction until the transaction commits or rollsback.
    Thanks
    Kingshuk

  • How to Block spam,malware in exchange server 2013

    How to block spam,junk mails inexchange server 2013 with out blocking normal mail. when i tried enable antispam on my sonicwall some important mails also removed. how to rectify these issues

    Hi ,
    To get it corrected , please contact sonicwall vendor to reduce the aggressive blocking in sonicwall.
    If you are not interested in third party solutions please use the EDGE SERVER as your smarthost and on that EDGE server you can enable Anti-Spam features to block the forged connections and fake mails.
    http://exchangeserverpro.com/installing-exchange-server-2013-edge-transport-server/
    http://exchangeserverpro.com/add-ip-block-list-provider-exchange-server-2013-edge-transport/
    http://exchangequery.com/2014/03/21/comparing-the-differences-between-antispam-agents-from-exchange-2010-to-exchange-2013/
    Thanks & Regards S.Nithyanandham

  • How to block a website (for all devices) on an EA6900

    I'm trying to figure out how to block a website for all devices connected to my router. The only thing I can find is blocking websites by device. Please tell me that they did not take this feature away.

    welcome to the 'smart' world.  I think one of the best improvements Belkin could do is to give us back the option of the old gui. so much more useful.

  • How to block my stolen ipod touch via serial number

    can anyone knows how to block my ipod touch 5th gen via serial number ? the one who stole my ipod touch has the capabilities about idevices .. i want atleast to block my stolen ipod for them not to use it or atleast that device is not being a useful one .. sorry for my bad english hope you guys get my point,many thanks in advace .. please suggestions?

    You can't block (nor locate) it via the serial number.
    If you had Find My iPod enabled on it then you could try locating it either via http://icloud.com on a computer or Find My iPhone on another device - but that will only work if it's connected to a network and the device hasn't already been wiped and/or Find My iPod disabled on it (if it was on iOS 7 as your tagline suggests then Find My iPod should be harder to disable).
    You've reported it to the police ? You should also change your iTunes account password, your email account passwords, and any passwords that you'd stored on websites/emails/notes etc.
    (For info you've posted in the Using iPad forum)

Maybe you are looking for