Depending on the brand of transceiver that you are using, you may be able to add all of the MAC addresses of the access points that you are using into the transceiver's DB. I used a Lucent WaveLAN wireless network, and we were able to prevent anybody from connecting unless we had entered the MAC address into our DB. I realize that this doesn't address the question of "how do I discover if a rogue is connected", but this information may be able to allow you to not to have to worry about the need to detect rogue connections.
Virtually, MarC Eiler -----Original Message----- From: Hornat, Charles [mailto:[EMAIL PROTECTED]] Sent: Friday, February 22, 2002 1:22 PM To: [EMAIL PROTECTED] Subject: detecting wireless access points What is the best method to discover rogue wireless access points on your network? Other than the obvious, buy a laptop with a wireless card and search theory. Is there a network tool that would detect a wireless access point being plugged in? As a security administrator, I would like to have the ability to know if a user has purchased an access point and plugged it into my network. Any thoughts are appreciated. mrcorp ________________________________________________________________ The information contained in this message is intended only for the recipient, may be privileged and confidential and protected from disclosure. If the reader of this message is not the intended recipient, or an employee or agent responsible for delivering this message to the intended recipient, please be aware that any dissemination or copying of this communication is strictly prohibited. If you have received this communication in error, please immediately notify us by replying to the message and deleting it from your computer. Thank you, Standard & Poor's