Cisco has this functionality. I would think if it were illegal, they would be slapped pretty hard.
http://www.cisco.com/en/US/docs/wireless/ncs/1.0/configuration/guide/sol.html#wp1040128 Tagging and Containing Rogue Access Points When the Cisco Unified Wireless Network Solution is monitored using NCS, NCS generates the flags as rogue access point traps and displays the known rogue access points by MAC address. The operator can then display a map showing the location of the access points closest to each rogue access point. The next step is to mark them as Known or Acknowledged rogue access points (no further action), Alert rogue access points (watch for and notify when active), or Contained rogue access points (have between one and four access points discourage rogue access point clients by sending the clients deauthenticate and disassociate messages whenever they associate with the rogue access point). Regards, Chuck On Mon, Sep 24, 2012 at 9:13 AM, Jon Auer <[email protected]> wrote: > As part of the WiFi standard a AP can tell a client to stop talking to it. > Rogue AP containment systems impersonate the targeted AP and send these > messages to observed clients. > > This kind of functionality is important in cases where you need to prevent > employees from accidentally creating security breaches. Ie by plugging > their cradlepoint into the network or not disabling the wifi in a time > machine NAS. > On Sep 23, 2012 10:29 PM, "Doug Clark" <[email protected]> wrote: > >> If not with RF, how do you suppose that an AP would interfere with >> another AP? That is what the poster is asking about..... >> >> I am curious on how you would crack a WEP key without using RF signal..... >> What you are talking about is criminal and your right breaking into >> secure APs are not under the rules of Part-15. >> >> >> >> *-------Original Message-------* >> >> *From:* Jeromie Reeves <[email protected]> >> *Date:* 9/23/2012 5:53:20 PM >> *To:* WISPA General List <[email protected]> >> *Subject:* Re: [WISPA] Can they really do this? >> >> IANAL but, I am fairly sure P15 only applies to RF, not to the OSI >> layers. If the FCC does have control of the OSI layers from a P15 device >> then people doing WEP cracking and such are in violation of P15 and that >> really is a stretch. >> >> On Sat, Sep 22, 2012 at 6:19 AM, Doug Clark <[email protected]> wrote: >> If there is an AP that does that and it is operating in Part15, it >> would be directly in violation of the very rules that gave the device its >> right to exist! >> The major substance of Part-15 reads: This device complies with Part 15 >> of the FCC Rules. Operation is subject to the following two conditions: (1) >> this device may not cause harmful interference, and (2) this device must >> accept any interference received, including interference that may cause >> undesired operation. >> >> If the poster has actually seen an AP that does what he says it does then >> it would be in violation of Part 15 itself and thus an entity could lodge a >> formal complaint against the >> person or entity that was operating said AP and possibly end up with a >> $25,000.00 ticket. YMMV >> >> >> >> >> *-------Original Message-------* >> >> *From:* Greg Ihnen <[email protected]> >> *Date:* 9/22/2012 5:34:47 AM >> *To:* WISPA General List <[email protected]> >> *Subject:* [WISPA] Can they really do this? >> >> There's a current debate raging right now on the NANOG list about the ins >> and outs of setting up large temporary networks for things like >> conventions. >> >> This one post caught my attention. Has anyone heard of a WiFi AP that >> will spoof neighboring networks to intentionally interfere with them, not >> by occupying/jamming the spectrum in a brute force way, but rather by >> impersonating the other network and rejecting new associations? >> >> The quote: >> >> > One of which I forgot to mention. Many of the hotels (I believe all >> > Hilton properties at this time) have sold the facilities space for their >> > wifi network to another company. They CAN'T negotiate it with you, >> > because they don't own it any more. And most of these wifi networks have >> > stealth killers enabled, so that they spoof any other wifi zone they see >> > and send back reject messages to the clients. So you can't run them side >> > by side. >> >> Greg >> >> ------------------------------ >> >> _______________________________________________ >> Wireless mailing list >> [email protected] >> http://lists.wispa.org/mailman/listinfo/wireless >> >> >> _______________________________________________ >> Wireless mailing list >> [email protected] >> http://lists.wispa.org/mailman/listinfo/wireless >> >> >> >> ------------------------------ >> >> _______________________________________________ >> Wireless mailing list >> [email protected] >> http://lists.wispa.org/mailman/listinfo/wireless >> >> >> _______________________________________________ >> Wireless mailing list >> [email protected] >> http://lists.wispa.org/mailman/listinfo/wireless >> >> > _______________________________________________ > Wireless mailing list > [email protected] > http://lists.wispa.org/mailman/listinfo/wireless > >
_______________________________________________ Wireless mailing list [email protected] http://lists.wispa.org/mailman/listinfo/wireless
