If you find out which MAC is the "offender" you can follow your bridging/MAC address tables back to the source of the chaos. It's possible that the MAC is spoofed, as well, but you should at least be able to figure out a general idea of which AP the attacks are coming in from.
You can find out which MAC is doing this either by running a sniffer or running a piece of software on the bridge called "arpwatch" Hope this helps! Regards, Charles Hooper [email protected] wrote: > H E L P ! > > I need help, I am one of those people who SOMEDAY is going > to implement a routed network. I am now suffering from > hackers ARP spoofing and bringing down customers, parts of > my network and "man in the middle" attacks. I am the man in > the middle, so they can capture my passwords! > > I have about 700 subscribers on a one bridge network. I > need help stopping the attacks and then help with > implementing a routed network that can be managed and find > mischievous customers in the future. > > I do not have this expertise and looking for help. > > [email protected] > > > > > -------------------------------------------------------------------------------- > WISPA Wants You! Join today! > http://signup.wispa.org/ > -------------------------------------------------------------------------------- > > WISPA Wireless List: [email protected] > > Subscribe/Unsubscribe: > http://lists.wispa.org/mailman/listinfo/wireless > > Archives: http://lists.wispa.org/pipermail/wireless/ > -------------------------------------------------------------------------------- WISPA Wants You! Join today! http://signup.wispa.org/ -------------------------------------------------------------------------------- WISPA Wireless List: [email protected] Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
