[157330] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Detection of Rogue Access Points

daemon@ATHENA.MIT.EDU (Sean Harlow)
Mon Oct 15 20:29:46 2012

In-Reply-To: <CAO0-hXZAv-TrByy-8Ud9Xz4ssdVyFEFGRQ_xtHNSkiKMG16sJQ@mail.gmail.com>
Date: Mon, 15 Oct 2012 20:29:32 -0400
From: Sean Harlow <sean@seanharlow.info>
To: Joe Hamelin <joe@nethead.com>
Cc: nanog@nanog.org
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On Mon, Oct 15, 2012 at 7:31 PM, Joe Hamelin <joe@nethead.com> wrote:

> Jonathan stated that they have health data on the network and only company
> issued devices are allowed.  I would suggest to him that he inventory the
> equipment via MAC address (I'm guessing that it's mostly standard issue
> stuff that would be easy to recognize) and then lock down unused ports and
> setup up monitoring. If a new MAC appears on the network, then it better
> have been sent there by IT.
>

I won't argue with that.  When no official wireless network is involved, a
MAC whitelist can be very effective.  It'll catch any casual user
attempting to homebrew a WiFi setup and significantly increase the odds of
detecting an actual attacker.  Even if the switches are at the lowest end
of "smart" and only expose a web interface it's not too hard to rig up a
screen scraper to list the connected devices on a regular basis and alert
if anything new is seen.  I'd expect that there are probably at least a
dozen commercial and/or open source tools that already exist for the
purpose, actually.

home help back first fref pref prev next nref lref last post