As I was saying, there are differafcnes in what they mean by Rouge AP. If you do a deauth attack, its illegal, no matter what. What you can do is detect it, and find the port that its plugged into your network and physically remove it or turn off that port. (since its yours) no other attack is permitted, inside your business or not.
Dennis Burgess, CTO, Link Technologies, Inc. [email protected] <mailto:[email protected]> – 314-735-0270 – www.linktechs.net <http://www.linktechs.net> From: [email protected] [mailto:[email protected]] On Behalf Of Scott Piehn Sent: Tuesday, January 06, 2015 11:13 AM To: WISPA General List Subject: Re: [WISPA] Rogue Accesspoint Detection Looks like detection is ok. Containment is not. On the containment side. Is there a way to contain in only the following two situations SSID is same as yours AP is plugged into your network. --------------------------------------------------------- Scott M Piehn From: Dennis Burgess <mailto:[email protected]> Sent: Tuesday, January 6, 2015 10:50 AM To: WISPA General List <mailto:[email protected]> Subject: Re: [WISPA] Rogue Accesspoint Detection Nov of last year! http://www.cnn.com/2014/10/03/travel/marriott-fcc-wi-fi-fine/ Dennis Burgess, CTO, Link Technologies, Inc. [email protected] – 314-735-0270 – www.linktechs.net From: [email protected] [mailto:[email protected]] On Behalf Of Eric Albert Sent: Tuesday, January 06, 2015 10:47 AM To: WISPA General List Subject: Re: [WISPA] Rogue Accesspoint Detection This article goes back a few years but should help to frame this discussion. http://www.theruckusroom.net/2010/08/when-wips-really-hurt.html On Tue, Jan 6, 2015 at 11:43 AM, Dennis Burgess <[email protected]> wrote: Yep, you do not control the airwaves in your business, therefor you cannot interfere with any “access point” that conforms with Part-15. Dennis Burgess, CTO, Link Technologies, Inc. [email protected] – 314-735-0270 – www.linktechs.net From: [email protected] [mailto:[email protected]] On Behalf Of Adair Winter Sent: Tuesday, January 06, 2015 10:10 AM To: WISPA General List Subject: Re: [WISPA] Rogue Accesspoint Detection a public place such as a hotel chain vs my private business where I needed to be able to control the wifi and keep things like wifi pineapples from snooping on my business would be not allowed? On Tue, Jan 6, 2015 at 10:05 AM, Dennis Burgess <[email protected]> wrote: Note that many of these systems (rather rogue AP prevention) have been deemed illegal by the FCC, a hotel chain was fined 600k I think due to it. Dennis Burgess, CTO, Link Technologies, Inc. [email protected] – 314-735-0270 – www.linktechs.net From: [email protected] [mailto:[email protected]] On Behalf Of Scott Piehn Sent: Tuesday, January 06, 2015 9:49 AM To: WISPA General List Subject: [WISPA] Rogue Accesspoint Detection I have a customer that is being required to get rogue access point detection. not a one time thing but ongoing detection. What products have people used. --------------------------------------------------------- Scott M Piehn _______________________________________________ Wireless mailing list [email protected] http://lists.wispa.org/mailman/listinfo/wireless -- Adair Winter VP, Network Operations / Owner Amarillo Wireless | 806.316.5071 C: 806.231.7180 http://www.amarillowireless.net <http://www.amarillowireless.net> _______________________________________________ Wireless mailing list [email protected] http://lists.wispa.org/mailman/listinfo/wireless ________________________________ _______________________________________________ Wireless mailing list [email protected] http://lists.wispa.org/mailman/listinfo/wireless ________________________________ No virus found in this message. Checked by AVG - www.avg.com Version: 2014.0.4794 / Virus Database: 4253/8881 - Release Date: 01/06/15
_______________________________________________ Wireless mailing list [email protected] http://lists.wispa.org/mailman/listinfo/wireless
