Latest Event Updates

AirTight (MiniBlog)

Posted on Updated on

Another reason why I’m really stoked to be apart of #WFD7 is AirTight Networks.

That’s right folks AirTight will be at Wireless Field Day 7.  This will be AirTights third appearance at a Wireless Field Day event.  

AirTight has always intrigued me for the cool “Nerd Knobs” and interactive web GUI.  They get right to the point and show you the cool metrics that we Wireless folks love to see.   

With lucky number #WFD7 fast approaching, I wonder what AirTight has in store for the delegates?

@WirelessStew

Aruba eh? (MiniBlog)

Posted on

Sweet!!!! I was hoping Aruba would be present at #WFD7.  

This will be my first visit to the big Aruba HQ and really looking forward to getting a behind the scenes look at this mobility company up close and see how they are focusing on #GENMOBILE and 802.11ac.

Oh and lets not forget a new comer to the wireless vendor arena Sean Rynearson; Aruba’s Chief Airhead.  Over the past year I have been following Sean on twitter and on the Airhead community pages where he has been actively building up the Aruba Airhead’s.  

-WirelessStew

Avaya does Wireless? (MiniBlog)

Posted on Updated on

Yes folks you heard it right.  Avaya enters the Wireless Field head on.

Avaya in my mind has always been a heavy hitter in the VoIP, and Video space for years.  I’m really interested to see what Avaya will bring to the WiFi playground and how they will play with devices  at Wireless Field Day 7

My fellow #WFD7 delegate  Jennifer Huber also commented on this at Excited to hear Avaya present at Wireless Field Day 7!

 

-WirelessStew

 

Cisco releases new WLC UI, Changes default values (finally)

Posted on

WirelessStew:

My buddy Sam never rests, even blogs while having some downtime…

Originally posted on SC-WiFi:

Cisco released WLC code version 7.6.120.0 which brings with it (among other things) a new User Interface for the 2504 WLC. When you use the new simplified setup, it also changes many of the default values that haven’t yet been enabled by default in the base code. The new default values are:

Aironet IE: Disabled
DHCP Address Assignment (Guest SSID): Enabled
Client Band Select: Enabled
Local HTTP and DHCP Profiling: Enabled
Guest ACL: Applied
CleanAir: Enabled
Event Driven RRM: Enabled
Event Driven RRM Sensitivity, 2.4GHz: Low
Event Driven RRM Sensitivity, 5GHz: Medium
Channel Bonding, 5GHz: Enabled
DCA Channel Width: 40MHz
mDNS Global Snooping: Enabled
Default mDNS profile: Add better printer support, Add HTTP
AVC (no Control, only Visibility): Enabled*
Management via Wireless Clients: Enabled
HTTP/HTTPS Access: Enabled
WebAuth Secure Web: Enabled
Virtual IP Address: 192.0.2.1
Multicast Address: Not configured
Mobility Domain Name: Name of employee SSID
RF Group Name: Default

View original 123 more words

Cisco Security Advisory OpenSSL Heartbeat Extension Vulnerability in Multiple Cisco Products

Link Posted on Updated on

UPDATED

Cisco Security Advisory OpenSSL Heartbeat Extension Vulnerability in Multiple Cisco Products

heartbleed

OpenSSL Heartbeat Extension Vulnerability in Multiple Cisco Products

To my fellow mobility folks out there, Cisco has released the list of affected products of the Heatbeat Bug.   My suggestion is to keep an eye on this link for changes in software / appliance vulnerability status.   As a highlight Cisco Prime Infrastructure, Cisco Identity Services Engine (ISE) NOW SAFE . However IOS XE software is on the hotlist.

Note: even though Cisco WLC’s, MSE’s are listed ok please make sure your code is up to date for other known PSIRT advisories.

As reminder, always follow best practices and keep an eye on your PSIRT notices for all your devices.

Vulnerable Products
The following Cisco products are affected by this vulnerability:

  • The following Cisco products are affected by this vulnerability:
    • Cisco Mobility Service Engine (MSE) [CSCuo20622]
    • Cisco AnyConnect Secure Mobility Client for iOS [CSCuo17488]
    • Cisco ASA CX Context-Aware Security [CSCuo24523]
    • Cisco Desktop Collaboration Experience DX650 [CSCuo16892]
    • Cisco IOS XE [CSCuo19730]
    • Cisco IP Video Phone E20 [CSCuo26699]
    • Cisco MS200X Ethernet Access Switch [CSCuo18736]
    • Cisco Nexus 1000V InterCloud [CSCuo18287]
    • Cisco Security Manager [CSCuo19265]
    • Cisco TelePresence Conductor [CSCuo20306]
    • Cisco TelePresence EX Series [CSCuo26378]
    • Cisco Telepresence Integrator C Series [CSCuo26378]
    • Cisco TelePresence IP Gateway Series [CSCuo21597]
    • Cisco TelePresence ISDN GW 3241 [CSCuo21486]
    • Cisco TelePresence ISDN GW MSE 8321 [CSCuo21486]
    • Cisco TelePresence ISDN Link [CSCuo26686]
    • Cisco TelePresence MX Series [CSCuo26378]
    • Cisco TelePresence Profile Series [CSCuo26378]
    • Cisco TelePresence Serial Gateway Series [CSCuo21535]
    • Cisco TelePresence Server 8710, 7010 [CSCuo21468]
    • Cisco TelePresence Server on Multiparty Media 310, 320 [CSCuo21468]
    • Cisco TelePresence Server on Virtual Machine [CSCuo21468]
    • Cisco TelePresence Supervisor MSE 8050 [CSCuo21584]
    • Cisco TelePresence SX Series [CSCuo26378]
    • Cisco TelePresence Video Communication Server (VCS) [CSCuo16472]
    • Cisco Unified 7800 series IP Phones [CSCuo16987]
    • Cisco Unified 8961 IP Phone [CSCuo16938]
    • Cisco Unified 9951 IP Phone [CSCuo16938]
    • Cisco Unified 9971 IP Phone [CSCuo16938]
    • Cisco Unified Communications Manager (UCM) 10.0 [CSCuo17440]
    • Cisco Unified Presence Server (CUPS)[CSCuo21298], [CSCuo21289]
    • Cisco Universal Small Cell 5000 Series running V3.4.2.x software [CSCuo22301]
    • Cisco Universal Small Cell 7000 Series running V3.4.2.x software [CSCuo22301]
    • Cisco WebEx Meetings Server versions 2.x [CSCuo17528]
    • FireAMP Private Cloud virtual appliance
    • Small Cell factory recovery root filesystem V2.99.4 or later [CSCuo22358]

    Other Cisco products may be affected by this vulnerability. The list of affected products will be updated as the investigation continues.

Other Cisco products may be affected by this vulnerability. The list of affected products will be updated as the investigation continues.

Products Confirmed Not Vulnerable

The following Cisco products have been analyzed and are not affected by this vulnerability:

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140409-heartbleed

Cisco Security Advisory OpenSSL Heartbeat Extension Vulnerability in Multiple Cisco Products

Disclaimer:  Please use the link above for an updated list.