[157292] in North American Network Operators' Group
Re: Detection of Rogue Access Points
daemon@ATHENA.MIT.EDU (Joe Hamelin)
Sun Oct 14 17:23:13 2012
In-Reply-To: <CAC47Z9mEDndWoNUsXjUNgawifNtv4RXztLZgLZ2SLc4JTe0AGA@mail.gmail.com>
Date: Sun, 14 Oct 2012 14:23:02 -0700
From: Joe Hamelin <joe@nethead.com>
To: Jonathan Rogers <quantumfoam@gmail.com>
Cc: nanog@nanog.org
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
--
Joe Hamelin, W7COM, Tulalip, WA, 360-474-7474
On Sun, Oct 14, 2012 at 1:59 PM, Jonathan Rogers <quantumfoam@gmail.com>wrote:
> Gentlemen,
>
>
> I'm looking for innovative ideas on how to find such a rogue device,
>
Check ARP tables for MAC address of wireless devices (first few nybbles
show manufacturer.) Or for ports with multiple devices where you know
there aren't switches.
> ideally as soon as it is plugged in to the network.
That's going to take some decent scripting. Left as an exercise...
>
--
Joe Hamelin, W7COM, Tulalip, WA, 360-474-7474