[174846] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Marriott wifi blocking

daemon@ATHENA.MIT.EDU (Steven Miano)
Fri Oct 3 16:28:48 2014

X-Original-To: nanog@nanog.org
In-Reply-To: <FCD26398C5EDE746BFC47F43EA52A17305EEFC@dino.ad.hostasaurus.com>
From: Steven Miano <mianosm@gmail.com>
Date: Fri, 3 Oct 2014 16:16:37 -0400
Cc: NANOG <nanog@nanog.org>
Errors-To: nanog-bounces@nanog.org

There are IPS features in nearly all of the 'enterprise' level wireless
products now:

http://www.cisco.com/c/en/us/products/collateral/wireless/adaptive-wireless-ips-software/data_sheet_c78-501388.html

http://www.aerohive.com/solutions/applications/secure.html

Doing a search for WIPs - or browsing forums about poorly configured
WIPS/Policies can show that the deauth storms can be quite turbulent.

~mianosm

On Fri, Oct 3, 2014 at 4:06 PM, David Hubbard <dhubbard@dino.hostasaurus.com
> wrote:

> Saw this article:
>
> http://www.cnn.com/2014/10/03/travel/marriott-fcc-wi-fi-fine/
>
> The interesting part:
>
> 'A federal investigation of the Gaylord Opryland Resort and
> Convention Center in Nashville found that Marriott employees
> had used "containment features of a Wi-Fi monitoring system"
> at the hotel to prevent people from accessing their own
> personal Wi-Fi networks.'
>
> I'm aware of how the illegal wifi blocking devices work, but
> any idea what legal hardware they were using to effectively
> keep their own wifi available but render everyone else's
> inaccessible?
>
> David
>

home help back first fref pref prev next nref lref last post