[157308] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Detection of Rogue Access Points

daemon@ATHENA.MIT.EDU (Karl Auer)
Sun Oct 14 22:15:10 2012

From: Karl Auer <kauer@biplane.com.au>
To: nanog@nanog.org
Date: Mon, 15 Oct 2012 13:11:00 +1100
In-Reply-To: <CAC47Z9mEDndWoNUsXjUNgawifNtv4RXztLZgLZ2SLc4JTe0AGA@mail.gmail.com>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On Sun, 2012-10-14 at 16:59 -0400, Jonathan Rogers wrote:
> An issue has come up in my organization recently with
> rogue access points.

No-one has said this yet, so I will - why are people working around your
normal network policies? This is often a sign of something lacking that
people need in their daily work. You can often reduce this sort of
"innocent thievery" down to a manageable minimum simply by making sure
that people have the tools they need to work.

Sometimes it's cheaper to give people what they want than to prevent
them taking it. Maybe at least consider that as an option.

Regards, K.


-- 
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Karl Auer (kauer@biplane.com.au)
http://www.biplane.com.au/kauer
http://www.biplane.com.au/blog

GPG fingerprint: AE1D 4868 6420 AD9A A698 5251 1699 7B78 4EEE 6017
Old fingerprint: DA41 51B1 1481 16E1 F7E2 B2E9 3007 14ED 5736 F687



home help back first fref pref prev next nref lref last post