Detection of Rogue Access Points

Suresh Ramasubramanian ops.lists at gmail.com
Mon Oct 15 02:09:56 UTC 2012


SSL throughout the network, with access control enforced using certificates
is certainly a good idea.

But most of the problem you face is metrics and inventory control of
authorized devices.  Commercial WIPS gear does a lot of this heavy lifting
without your having to script it all yourself.

On Monday, October 15, 2012, Jimmy Hess wrote:

> A NAT device is one example.....
> another example of an unauthorized device could be an unauthorized
> hardware keylogger/ network backdoor,  with unauthorized connectivity to
> the LAN,  and
> possible  covert channels/backdoors/firewall bypasses.
>
>

-- 
Suresh Ramasubramanian (ops.lists at gmail.com)


More information about the NANOG mailing list