Comments
-
+1 for Mac filtering and port security on Nebula switches. I had a similar situation some time ago...At the end what I did was to setup a virtual machine with window server, setup a Radius server and use the Radius policy on switch ports to allow mac authentication on those ports. Hopefully it is also useful for you!
-
I wouldn't call it a problem, to me it just looks like the APP doesn't include everything as NCC, more like the simplified yet important information. In my case, I don't use description or tags, so I don't miss them on the APP. I'm not saying it shouldn't be added tho
-
The WAC6303D-S has a built-in smart antenna and that will do the trick, so I don't think the antenna pattern is needed for this model. Am I right?
-
AWESOME! it looks neat indeed! Looking forward to it, the network usage from the client point of view is a huuuuge improvement that I need.
-
If they are not shown in your dashboard, check your organization inventory, probably they haven't been assigned to the site. If they are showing but offline, sounds like the APs are not yet connected to nebula. check the configure part of the AP tab and you will find it. ;)
-
+1 for this request
-
Are you using those switches with Nebula or standalone? I know Nebula has a backup and restore tool but it's not automatic, you need to back it up yourself. Then I've also heard the USGs have a backup mechanism but I cannot tell you much about it. Nebula do have config change alerts.
-
I believe it's better you leave Brazil in the country field. It might be that the current channel has interference, try by disabling "DCS client aware", then click "DCS now" and see if the performance improves.
-
Looks like your AP hasn't been updated. Check the configuration status in AP page.
-
The WAC6303D-S has smart antenna incorporated. You could check their components in the overview tap of the links. Agree that is not clear in their specs page...
-
According to the smart mesh model list on Nebula, the WAC6103D-I is supported
-
@Denis are your 15 access points in the same L2 network? I have used captive portal implemented in the access points and the roaming works fine between the access points, no need to connect to each AP first. If your access points are in different subnets, then that could be the reason.
-
You could use the LAN 1 interface as Management VLAN and don't need to create a VLAN 1. If you don't want to use LAN 1, make sure that the uplink port on the switch (connecting to the NSG) has a PVID that is different than 1, 10, 20 or 30, which are VLAN interfaces you create, it could be 100 for example. In this case, the…
-
There's an option to block all the access including HTTPS before passing captive portal authentication, but in the video this option seems to be selected. If so, the next thing I would check is google chrome as it likes to store the pages in cache, try to close and re-open it
-
The LAN ports are there to connect another AP mainly. If you connect the LAN 1 back to your switch, you are probably creating a loop.