Even if you had your setup as an AdHoc system running VPN over it?
----- Original Message ----- From: <[EMAIL PROTECTED]> To: "Trevor S" <[EMAIL PROTECTED]>; "Marc Eiler (Volt)" <[EMAIL PROTECTED]>; "Hornat, Charles" <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]> Sent: Tuesday, March 05, 2002 4:02 AM Subject: RE: detecting wireless access points > Yes, they do. > > D. Weiss > MCSE/CCNA/SSP2 > > > -----Original Message----- > From: Trevor S [mailto:[EMAIL PROTECTED]] > Sent: Monday, March 04, 2002 5:28 AM > To: Marc Eiler (Volt); Hornat, Charles; > [EMAIL PROTECTED] > Subject: Re: detecting wireless access points > > > Do sniffers like AirSnort detect the MAC addresses of the devices that are > being used? > > On Thursday 28 February 2002 04:36 pm, Marc Eiler (Volt) wrote: > > Depending on the brand of transceiver that you are using, you > > may be able to add all of the MAC addresses of the access points that > > you are using into the transceiver's DB. I used a Lucent WaveLAN > > wireless network, and we were able to prevent anybody from connecting > > unless we had entered the MAC address into our DB. I realize that this > > doesn't address the question of "how do I discover if a rogue is > > connected", but this information may be able to allow you to not to have > > to worry about the need to detect rogue connections. > > > > Virtually, > > MarC Eiler > > > > -----Original Message----- > > From: Hornat, Charles [mailto:[EMAIL PROTECTED]] > > Sent: Friday, February 22, 2002 1:22 PM > > To: [EMAIL PROTECTED] > > Subject: detecting wireless access points > > > > What is the best method to discover rogue wireless access points on your > > network? Other than the obvious, buy a laptop with a wireless card and > > search theory. Is there a network tool that would detect a wireless > > access point being plugged in? > > > > As a security administrator, I would like to have the ability to know if > > a user has purchased an access point and plugged it into my network. > > > > Any thoughts are appreciated. > > > > mrcorp > > > > > > ________________________________________________________________ > > The information contained in this message is intended only for the > > recipient, may be privileged and confidential and protected from > > disclosure. If the reader of this message is not the intended recipient, > > or an employee or agent responsible for delivering this message to the > > intended recipient, please be aware that any dissemination or copying of > > this communication is strictly prohibited. If you have received this > > communication in error, please immediately notify us by replying to the > > message and deleting it from your computer. > > > > Thank you, > > Standard & Poor's > > >