The first thing to do is upgrade to manage switches. I use the cisco ones ($250 used or so) and then do something called Protected Port. Basically it blocks client to client communication. Just like we do with the ap's.
That should help some of it. Naturally you already block client to client at the ap's right? marlon ----- Original Message ----- From: <[email protected]> To: <[email protected]> Sent: Wednesday, April 14, 2010 8:35 PM Subject: [WISPA] Bridge Network - ARP Poisioning > H E L P ! > > I need help, I am one of those people who SOMEDAY is going > to implement a routed network. I am now suffering from > hackers ARP spoofing and bringing down customers, parts of > my network and "man in the middle" attacks. I am the man in > the middle, so they can capture my passwords! > > I have about 700 subscribers on a one bridge network. I > need help stopping the attacks and then help with > implementing a routed network that can be managed and find > mischievous customers in the future. > > I do not have this expertise and looking for help. > > [email protected] > > > > > -------------------------------------------------------------------------------- > WISPA Wants You! Join today! > http://signup.wispa.org/ > -------------------------------------------------------------------------------- > > WISPA Wireless List: [email protected] > > Subscribe/Unsubscribe: > http://lists.wispa.org/mailman/listinfo/wireless > > Archives: http://lists.wispa.org/pipermail/wireless/ -------------------------------------------------------------------------------- WISPA Wants You! Join today! http://signup.wispa.org/ -------------------------------------------------------------------------------- WISPA Wireless List: [email protected] Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
