[157306] in North American Network Operators' Group
Re: Detection of Rogue Access Points
daemon@ATHENA.MIT.EDU (Suresh Ramasubramanian)
Sun Oct 14 22:10:08 2012
In-Reply-To: <CAAAwwbWD7S6_ZqEaFgE5ZaGyGsaTazSJ6nAjbCKm9fOm+KXc2Q@mail.gmail.com>
Date: Mon, 15 Oct 2012 07:39:56 +0530
From: Suresh Ramasubramanian <ops.lists@gmail.com>
To: Jimmy Hess <mysidia@gmail.com>
Cc: "nanog@nanog.org" <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
SSL throughout the network, with access control enforced using certificates
is certainly a good idea.
But most of the problem you face is metrics and inventory control of
authorized devices. Commercial WIPS gear does a lot of this heavy lifting
without your having to script it all yourself.
On Monday, October 15, 2012, Jimmy Hess wrote:
> A NAT device is one example.....
> another example of an unauthorized device could be an unauthorized
> hardware keylogger/ network backdoor, with unauthorized connectivity to
> the LAN, and
> possible covert channels/backdoors/firewall bypasses.
>
>
--
Suresh Ramasubramanian (ops.lists@gmail.com)