[157308] in North American Network Operators' Group
Re: Detection of Rogue Access Points
daemon@ATHENA.MIT.EDU (Karl Auer)
Sun Oct 14 22:15:10 2012
From: Karl Auer <kauer@biplane.com.au>
To: nanog@nanog.org
Date: Mon, 15 Oct 2012 13:11:00 +1100
In-Reply-To: <CAC47Z9mEDndWoNUsXjUNgawifNtv4RXztLZgLZ2SLc4JTe0AGA@mail.gmail.com>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
On Sun, 2012-10-14 at 16:59 -0400, Jonathan Rogers wrote:
> An issue has come up in my organization recently with
> rogue access points.
No-one has said this yet, so I will - why are people working around your
normal network policies? This is often a sign of something lacking that
people need in their daily work. You can often reduce this sort of
"innocent thievery" down to a manageable minimum simply by making sure
that people have the tools they need to work.
Sometimes it's cheaper to give people what they want than to prevent
them taking it. Maybe at least consider that as an option.
Regards, K.
--
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Karl Auer (kauer@biplane.com.au)
http://www.biplane.com.au/kauer
http://www.biplane.com.au/blog
GPG fingerprint: AE1D 4868 6420 AD9A A698 5251 1699 7B78 4EEE 6017
Old fingerprint: DA41 51B1 1481 16E1 F7E2 B2E9 3007 14ED 5736 F687