I am designing an R/F system for a client. It will have one R/F PDT (Portable Data Terminal) and four Access Points, possibly connected in a linear configuration (AP "A" is wired to the network, but AP "D" RFs its data to "C", "C" RFs to "B" and "B" R/Fs to "A". This will be 802.11b technology.

The client is concerned about "drive-by hackers," (aka rogue access points). I've tried to come up to speed on Kerberos and other security measures. But I have found at least one major issue that I don't offhand see an answer to:

If the drive-by hacker is using a consumer-grade access point, will it be silent and invisible to the Kerberos server? That is, will I have to monitor the wireless airwaves with probes that listen to R/F communications in the proximity of the wired network if I use Kerberos?

Many thanks in advance.
Best,
Bill Amatneek







________________________________________________
Kerberos mailing list           [EMAIL PROTECTED]
https://mailman.mit.edu/mailman/listinfo/kerberos

Reply via email to