Hello, all. We've got a new wireless network using Meraki MR42s (and one MR33 freebie) and I've got a mystery that doesn't actually matter. But, I'd like to solve the mystery as an opportunity to learn about the tech. Here's the deal: We're a small business on one floor of a building we share with other businesses. Someone (almost certainly not one of us) is frequently trying to log into our Wi-Fi as "Eiffel 65," which is a user that does not exist. They're also an Italian electronic band with that one song from the late '90s and is to their credit and my surprise still making music. This happens every weekday from about 8:30am to 5:15pm. My objective is to get "Eiffel 65" to stop, (the user, not the band, but if I get both, so be it.) Again, it doesn't really matter except as an opportunity to learn. Our Wi-Fi is using WPA2-Enterprise (EAP+MSCHAPv2) backended with a a local AD and RADIUS via NPS on Windows Server 2016. It's working great for legitimate users and I don't want to interrupt them. My idea was to somehow let the Eiffel 65 client authenticate on to our wi-fi, where I'd block them with the Meraki, showing a page asking them to "please stop trying." I could get RADIUS to approve based on MAC alone, but the wi-fi connection failed, I assume because the Meraki is expecting EAP and MSCHAPv2. I created a local Eiffel 65 user, but I couldn't successfully guess the password the user is submitting to let them in. Anyway, I'm blue that I haven't been able to sort this out. What might I try? TIA
... View more