Detection of Rogue Access Points

Karl Auer kauer at biplane.com.au
Mon Oct 15 02:11:00 UTC 2012


On Sun, 2012-10-14 at 16:59 -0400, Jonathan Rogers wrote:
> An issue has come up in my organization recently with
> rogue access points.

No-one has said this yet, so I will - why are people working around your
normal network policies? This is often a sign of something lacking that
people need in their daily work. You can often reduce this sort of
"innocent thievery" down to a manageable minimum simply by making sure
that people have the tools they need to work.

Sometimes it's cheaper to give people what they want than to prevent
them taking it. Maybe at least consider that as an option.

Regards, K.


-- 
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Karl Auer (kauer at biplane.com.au)
http://www.biplane.com.au/kauer
http://www.biplane.com.au/blog

GPG fingerprint: AE1D 4868 6420 AD9A A698 5251 1699 7B78 4EEE 6017
Old fingerprint: DA41 51B1 1481 16E1 F7E2 B2E9 3007 14ED 5736 F687





More information about the NANOG mailing list