Re: [WIRELESS-LAN] Wireless Identification Tools

2005-02-04 Thread Clark Gaylord
Yantis, Jonathan Lindsey wrote:
Sometimes that is the case and sometimes not.  I think what Jeff was
saying is that they connected to the AP with a client and then pinged a

Not necessarily. You can snarf it off the beacon, even if it is closed.
device or something along those lines to get the clients mac to show up

That certainly is a good method when it works, but the WAP may not be open.
on a port.  Then you don't have to worry about the APs mac, you just
look for your own.

Even if not obiwan, it is often within a few octets.  Start with
show mac-address-table | include ..xx
and then remove more nibbles until you start getting hits.  You still
may not get close (WAPs with PCCard NICs will generally not be close ...
e.g. RoamAbouts have Yago wired, but whatever Lucent-style you plug in
on the wireless), but the usual Linksys/Dlink/Belkin crap will get
caught this way.  Sometimes you just have to resort to the Pringles Can
of Death or the 4MegaWatt 2.4GHz transmitter, but start with these tricks.
And if all else fails, I guarantee if you start walking around with a
big wad of keys, a pair of wire-cutters, a BVS Locust, and a couple of
your biggest and ugliest from the network goon squad, it won't take long
to find the remaining WAPs ... just like rats skittering for the hole.
--ckg
**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.


Re: [WIRELESS-LAN] Wireless Identification Tools

2005-02-04 Thread Clark Gaylord
Michael Dickson wrote:
Using port security tends to open a can of worms with faculty and TA's
who use hubs in overcrowded offices. Also, it does not defend against
rogue AP's or other devices doing NAT, as only a single mac is seen on
the switch.
And not running it opens a security can of worms (though I give a big
thumbs-up to Cisco for having per-port forwarding table limit < global
switch limit).  You are correct that it cannot help with NAT boxes, but
it is a Good Thing anyway.  We allow private networks, at the same
per-station cost to users, if they want to order that, but the default
is one port = one MAC.  We also only run port-fast if it is a single
station port, which is also a Good Thing.
--ckg
**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.


RE: [WIRELESS-LAN] Wireless Identification Tools

2005-02-04 Thread Frank Bulk
If you are looking to find Ethernet devices on your network the open source
Netdisco is good place to start:
http://netdisco.org

If you are running a homogenous network with Cisco, Foundry, or some other
vendor that has CDP, etc support, it should be easy enough to whip up a Perl
script that traces the port from the core down to the edge.  I wrote one two
years ago for our Cisco network and it does in seconds what took me minutes
by hand with consecutive telnet sessions.  Rogue PC's that showed up on our
ResNET were automatically traced and recorded for later visitations.

At the end of the day you don't want to have to walk around your dorms with
a PocketPC to find rogue devices.  I think you're much better off doing some
wireside detection (that looks for nodes that have not registered with your
ResNET system), use some more affordable wireless security such as provided
by Network Chemistry, or, better yet, obviate the need by providing wireless
service in those areas.

Frank

-Original Message-
From: 802.11 wireless issues listserv
[mailto:[EMAIL PROTECTED] On Behalf Of Metzler, David
Sent: Friday, February 04, 2005 7:18 PM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: Re: [WIRELESS-LAN] Wireless Identification Tools

We take a similar tact, but use the idea of tracking the IP address reported
by an internal campus web server to a specific location.
(Which we need to do for virus outbreaks anyway) Because we use VLAN's it's
a little tedious to search all networks for a similar mac address.

So we use a little server side script to report the IP address as its seen
by our web server (this gives you the external address even on NAT enabled
AP's.

The process is as follows:

1.  When we find the wireless signal that we can get internet connection on
visit the following web page:
http://www.evergreen.edu/netservices/clientinfo.asp (this page was designed
small enough to display easily on pocket pc or other handheld).


2.  Go to the internal router for the subnet or get on the same subnet and
arp the ip to obtain the mac address.  (there's problably more graceful ways
to do this, particularly if you're on the same subnet).

3.  Follow the switch tables to track the port to its physical location on
our LAN.

I find having the IP as reported by the web server, also lets me know how
worried to be about the rougue AP, since it tells me instantly if its on a
public network jack or a higher security network.  (again VLANs make it
harder to know).

David Metzler
The Evergreen State College

-Original Message-
From: 802.11 wireless issues listserv
[mailto:[EMAIL PROTECTED] On Behalf Of Jeff Wolfe
Sent: Friday, February 04, 2005 12:53 PM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: Re: [WIRELESS-LAN] Wireless Identification Tools

Philippe Hanset wrote:
> Don,
>
> A trick that I have been willing to test for a long time would be to
> join the Rogue AP, send traffic to a know sniffing host in that same
> layer2 network.
> This will reveal the Wired MAC address of the AP.
> Then search for that MAC on your wired side and disable the port.
> (if you have a good circuit-to-switchport DB, you know the location as
> well)
> If the AP doesn't allow guests, we use Directional Antennas and
> Wireless Sniffers as you mentioned.
>
> And as I have mentioned before: we rarely have Rogue APs in places
> were we provide decent Free Wireless coverage!

We've been able to have good luck by searching our switch FDBs for MAC
addresses matching all but the last octet of the MAC address in the rogue
AP's beacon. More often than not, manufacturers use sequential MAC addresses
for the wired and wireless ports of their devices. Of the 5 or
6 rogues we've seen over the last year, all were locatable that way.

YMMV.. :)


-JEff

**
Participation and subscription information for this EDUCAUSE Constituent
Group discussion list can be found at http://www.educause.edu/groups/.

**
Participation and subscription information for this EDUCAUSE Constituent
Group discussion list can be found at http://www.educause.edu/groups/.

**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.


RE: [WIRELESS-LAN] Wireless Identification Tools

2005-02-04 Thread Metzler, David
We take a similar tact, but use the idea of tracking the IP address
reported by an internal campus web server to a specific location.
(Which we need to do for virus outbreaks anyway) Because we use VLAN's
it's a little tedious to search all networks for a similar mac address. 

So we use a little server side script to report the IP address as its
seen by our web server (this gives you the external address even on NAT
enabled AP's. 

The process is as follows: 

1.  When we find the wireless signal that we can get internet connection
on visit the following web page:
http://www.evergreen.edu/netservices/clientinfo.asp (this page was
designed small enough to display easily on pocket pc or other handheld).


2.  Go to the internal router for the subnet or get on the same subnet
and arp the ip to obtain the mac address.  (there's problably more
graceful ways to do this, particularly if you're on the same subnet).

3.  Follow the switch tables to track the port to its physical location
on our LAN. 

I find having the IP as reported by the web server, also lets me know
how worried to be about the rougue AP, since it tells me instantly if
its on a public network jack or a higher security network.  (again VLANs
make it harder to know). 

David Metzler
The Evergreen State College

-Original Message-
From: 802.11 wireless issues listserv
[mailto:[EMAIL PROTECTED] On Behalf Of Jeff Wolfe
Sent: Friday, February 04, 2005 12:53 PM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: Re: [WIRELESS-LAN] Wireless Identification Tools

Philippe Hanset wrote:
> Don,
>
> A trick that I have been willing to test for a long time would be to 
> join the Rogue AP, send traffic to a know sniffing host in that same 
> layer2 network.
> This will reveal the Wired MAC address of the AP.
> Then search for that MAC on your wired side and disable the port.
> (if you have a good circuit-to-switchport DB, you know the location as
> well)
> If the AP doesn't allow guests, we use Directional Antennas and 
> Wireless Sniffers as you mentioned.
>
> And as I have mentioned before: we rarely have Rogue APs in places 
> were we provide decent Free Wireless coverage!

We've been able to have good luck by searching our switch FDBs for MAC
addresses matching all but the last octet of the MAC address in the
rogue AP's beacon. More often than not, manufacturers use sequential MAC
addresses for the wired and wireless ports of their devices. Of the 5 or
6 rogues we've seen over the last year, all were locatable that way.

YMMV.. :)


-JEff

**
Participation and subscription information for this EDUCAUSE Constituent
Group discussion list can be found at http://www.educause.edu/groups/.

**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.


RE: [WIRELESS-LAN] Wireless Identification Tools

2005-02-04 Thread Donald Gallerie
John,

While this list is not definitive, the attached is used by Netdiso
to try to identify access points from the wired side.  My understanding
is that the list was actually born within Kismet but I cannot verify
that.

Don

-Original Message-
From: 802.11 wireless issues listserv
[mailto:[EMAIL PROTECTED] On Behalf Of John Watters
Sent: Friday, February 04, 2005 4:15 PM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: Re: [WIRELESS-LAN] Wireless Identification Tools

Where can we find a good list of the MAC address ranges for wireless access
points? If I just look
by manufacturer (see http://standards.ieee.org/regauth/oui/index.shtml) I do
not see a distinction
between their access points & their NICs, switches, routers, and other
network equipment?

-jcw



> To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
> From: Jeff Wolfe <[EMAIL PROTECTED]>
> Date: Fri, 4 Feb 2005 15:53:26 -0500
> Subject: Re: [WIRELESS-LAN] Wireless Identification Tools
> Reply-To: "802.11 wireless issues listserv"

> Return-Path: <[EMAIL PROTECTED]>
> Message-ID: <[EMAIL PROTECTED]>
> In-Reply-To: <[EMAIL PROTECTED]>
> References: <[EMAIL PROTECTED]>
> <[EMAIL PROTECTED]>
> Content-Type: text/plain; charset=ISO-8859-1; format=flowed
> Received: from listserv.educause.edu (isaco2.educause.edu [198.59.61.25])
>   by bama.ua.edu (8.12.10/8.12.10) with ESMTP id j14L4pbL000857
>   for <[EMAIL PROTECTED]>; Fri, 4 Feb 2005 15:04:52 -0600 (CST)
> Sender: "802.11 wireless issues listserv"

> MIME-Version: 1.0
> Content-Transfer-Encoding: 7bit
>
> Philippe Hanset wrote:
> > Don,
> >
> > A trick that I have been willing to test for a long time would be
> > to join the Rogue AP, send traffic to a know sniffing host
> > in that same layer2 network.
> > This will reveal the Wired MAC address of the AP.
> > Then search for that MAC on your wired side and disable the port.
> > (if you have a good circuit-to-switchport DB, you know the location as
> > well)
> > If the AP doesn't allow guests, we use Directional Antennas
> > and Wireless Sniffers as you mentioned.
> >
> > And as I have mentioned before: we rarely have Rogue APs
> > in places were we provide decent Free Wireless coverage!
>
> We've been able to have good luck by searching our switch FDBs for MAC
> addresses matching all but the last octet of the MAC address in the
> rogue AP's beacon. More often than not, manufacturers use sequential MAC
> addresses for the wired and wireless ports of their devices. Of the 5 or
> 6 rogues we've seen over the last year, all were locatable that way.
>
> YMMV.. :)
>
>
> -JEff
>
> **
> Participation and subscription information for this EDUCAUSE Constituent
Group discussion list
> can be found at http://www.educause.edu/groups/.
>





John Watters  UA: Office of Information Technology  205-348-3992

**
Participation and subscription information for this EDUCAUSE Constituent
Group discussion list can be found at http://www.educause.edu/groups/.


**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.
00:00:94:CB Asante,
00:01:03:7C 3Com,
00:01:24:24 SMC SMC7004AWBR,
00:01:24:F0 Acer,
00:01:24:F1 Acer,
00:01:f4Enterasys Networks,
00:02:2dAgere / Lucent Systems,
00:02:a5:6e:46  Compaq Computer Corporation,
00:02:a5:6e:47  Compaq Computer Corporation,
00:02:a5:6f Compaq Computer Corporation,
00:02:b3:65 Intel Corporation,
00:02:b3:86 Intel Corporation,
00:02:b3:92 Intel Corporation,
00:02:b3:94 Intel Corporation,
00:02:b3:B1 Intel Corporation,
00:02:6FSenao,
00:03:2fGlobal Sun Technology, Inc.,
00:04:3A:3A Avaya ad-01444,
00:04:5a:0c The Linksys Group, Inc.,
00:04:5A:0E Linksys WAP11,
00:04:5a:0f The Linksys Group, Inc.,
00:04:5a:23 The Linksys Group, Inc.,
00:04:5a:26 The Linksys Group, Inc.,
00:04:5A:2E Linksys BEFW11S4,
00:04:5a:2f The Linksys Group, Inc.,
00:04:5A:5A Linksys BEFW11S4,
00:04:5a:cc The Linksys Group, Inc.,
00:04:5a:cd The Linksys Group, Inc.,
00:04:5a:ce The Linksys Group, Inc.,
00:04:5a:cf The Linksys Group, Inc.,
00:04:5a:d0 The Linksys Group, Inc.,
00:04:5a:d1 The Linksys Group, Inc.,
00:04:5a:d2 The Linksys Group, Inc.,
00:04:5a:d8 The Linksys Group, Inc.,
00:04:5a:da The Linksys Group, Inc.,
00:04:5a:db The Linksys Group, Inc.,
00:04:5a:dd The Linksys Group, Inc.,
00:04:5a:e4 The Linksys Group, Inc.,
00:04:5a:e8 The Linksys Group, Inc.,
00:04:5a:eb The Linksys Group, Inc.,
00:04:5a:ee The Linksys Group, Inc.,
00:04:5a:f6 The Linksys Group, Inc.,
00:04:5a:f9 The Linksys Group, Inc.,
00:04:5a:fa The Linksys Group, Inc.,
00:04:5a:fc The Linksys Group, Inc.,
00:04:5a:fd The Linksys Group, Inc.,
00:04:75:62 3 Com Corporation,
00:04:75:75 3Com 3C

Re: [WIRELESS-LAN] Wireless Identification Tools

2005-02-04 Thread Jeff Wolfe
John Watters wrote:
Where can we find a good list of the MAC address ranges for wireless access 
points? If I just look
by manufacturer (see http://standards.ieee.org/regauth/oui/index.shtml) I do 
not see a distinction
between their access points & their NICs, switches, routers, and other network 
equipment?
I'm not aware that there is such a list. Even if there was, I imagine
it'd be continuously out of date.
As I mentioned earlier, our technique is to capture an AP beacon frame
and extract the MAC address in the beacon frame. (Usually, the WLSE does
that part of the job for us, although we do occasionally wander around
with netstumbler.)
Once we have the MAC from the beacon, we just query our network
management database for all mac addresses that are similar, except for
the last octet eg:
'select * from macdb where mac like "nn:nn:nn:nn:nn:%"'.
We then investigate any wired MAC addresses that turn up in the search.
So far, this method has worked for all the rogues we've investigated..
I expect that sooner or later we'll find some APs that don't have
sequential MAC addresses, but that's just the way it goes.
-JEff
**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.


RE: [WIRELESS-LAN] Wireless Identification Tools

2005-02-04 Thread Frank Bulk
There aren't any easy answers, but both AirTight Networks (a startup) and
AirDefense play their wireless and wireside detection and mitigation
algorithms quite strongly.  In fact, all the wireless security vendors,
including Red M and AirMagnet will make some mention of 'proprietary' or
'patented' in regards to their detection algorithms.

AirTight doesn't require any proprietary hardware for their wireside
detection (AirDefense uses a Linux-base appliance to host their distributed
version), so perhaps it's worth it to ask them for a 30-day trial and see if
they prove their worth.
http://www.airtightnetworks.net/products/products-spectraguard.html

Regards,

Frank

-Original Message-
From: 802.11 wireless issues listserv
[mailto:[EMAIL PROTECTED] On Behalf Of Donald Gallerie
Sent: Friday, February 04, 2005 1:17 PM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: [WIRELESS-LAN] Wireless Identification Tools

In an effort to better identify rogue access points, can any of you
recommend tools that would make the physical and network pinpointing of WAPs
a bit easier.  We have identified a number of rogues but cannot ascertain
exactly where they are.  We have tried getting the mac address from the
wireless side and doing an arp lookup but oftentimes they are running NAT
and the mac on the wired side is different.

We would like to sweep the campus and get as much information as we can in a
single pass (automatic documentation features would also be useful).  I had
thought about using a directional antenna and netstumbler but thought others
may have found other, more user friendly tools.

Any recommendations?

Don Gallerie
Assistance Director
Telecommunications
The University at Albany

**
Participation and subscription information for this EDUCAUSE Constituent
Group discussion list can be found at http://www.educause.edu/groups/.

**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.


RE: [WIRELESS-LAN] Wireless Identification Tools

2005-02-04 Thread Yantis, Jonathan Lindsey
Sometimes that is the case and sometimes not.  I think what Jeff was
saying is that they connected to the AP with a client and then pinged a
device or something along those lines to get the clients mac to show up
on a port.  Then you don't have to worry about the APs mac, you just
look for your own. 

 -- Jonathan Yantis - [EMAIL PROTECTED] - (843-953-7770)

-Original Message-
From: 802.11 wireless issues listserv
[mailto:[EMAIL PROTECTED] On Behalf Of Justin N.
Borthwick
Sent: Friday, February 04, 2005 4:22 PM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: Re: [WIRELESS-LAN] Wireless Identification Tools

I think that what Jeff was implying was that if you know the wireless
side MAC address for the access point then it is a good bet that the
wired side MAC address is within one digit of it. So use a wireless
sniffer and find the wireless side and then start hunting for a MAC
address that has all but the same last digit. It has also been my
experience that the addresses are most often within one digit of each
other and always the last digit. 

Justin Borthwick
Systems Programmer, Senior
University of Wyoming
Ivinson 237
[EMAIL PROTECTED]
Phone: (307) 766-2815
Fax: (307) 766-2984

-Original Message-
From: John Watters [mailto:[EMAIL PROTECTED] 
Sent: Friday, February 04, 2005 2:15 PM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: Re: [WIRELESS-LAN] Wireless Identification Tools

Where can we find a good list of the MAC address ranges for wireless
access points? If I just look
by manufacturer (see http://standards.ieee.org/regauth/oui/index.shtml)
I do not see a distinction
between their access points & their NICs, switches, routers, and other
network equipment?

-jcw



> To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
> From: Jeff Wolfe <[EMAIL PROTECTED]>
> Date: Fri, 4 Feb 2005 15:53:26 -0500
> Subject: Re: [WIRELESS-LAN] Wireless Identification Tools
> Reply-To: "802.11 wireless issues listserv"

> Return-Path: <[EMAIL PROTECTED]>
> Message-ID: <[EMAIL PROTECTED]>
> In-Reply-To: <[EMAIL PROTECTED]>
> References: <[EMAIL PROTECTED]>
> <[EMAIL PROTECTED]>
> Content-Type: text/plain; charset=ISO-8859-1; format=flowed
> Received: from listserv.educause.edu (isaco2.educause.edu
[198.59.61.25])
>   by bama.ua.edu (8.12.10/8.12.10) with ESMTP id j14L4pbL000857
>   for <[EMAIL PROTECTED]>; Fri, 4 Feb 2005 15:04:52 -0600 (CST)
> Sender: "802.11 wireless issues listserv"

> MIME-Version: 1.0
> Content-Transfer-Encoding: 7bit
>
> Philippe Hanset wrote:
> > Don,
> >
> > A trick that I have been willing to test for a long time would be
> > to join the Rogue AP, send traffic to a know sniffing host
> > in that same layer2 network.
> > This will reveal the Wired MAC address of the AP.
> > Then search for that MAC on your wired side and disable the port.
> > (if you have a good circuit-to-switchport DB, you know the location
as
> > well)
> > If the AP doesn't allow guests, we use Directional Antennas
> > and Wireless Sniffers as you mentioned.
> >
> > And as I have mentioned before: we rarely have Rogue APs
> > in places were we provide decent Free Wireless coverage!
>
> We've been able to have good luck by searching our switch FDBs for MAC
> addresses matching all but the last octet of the MAC address in the
> rogue AP's beacon. More often than not, manufacturers use sequential
MAC
> addresses for the wired and wireless ports of their devices. Of the 5
or
> 6 rogues we've seen over the last year, all were locatable that way.
>
> YMMV.. :)
>
>
> -JEff
>
> **
> Participation and subscription information for this EDUCAUSE
Constituent Group discussion list
> can be found at http://www.educause.edu/groups/.
>





John Watters  UA: Office of Information Technology  205-348-3992

**
Participation and subscription information for this EDUCAUSE Constituent
Group discussion list can be found at http://www.educause.edu/groups/.

**
Participation and subscription information for this EDUCAUSE Constituent
Group discussion list can be found at http://www.educause.edu/groups/.

**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.


RE: [WIRELESS-LAN] Wireless Identification Tools

2005-02-04 Thread Justin N. Borthwick
I think that what Jeff was implying was that if you know the wireless
side MAC address for the access point then it is a good bet that the
wired side MAC address is within one digit of it. So use a wireless
sniffer and find the wireless side and then start hunting for a MAC
address that has all but the same last digit. It has also been my
experience that the addresses are most often within one digit of each
other and always the last digit. 

Justin Borthwick
Systems Programmer, Senior
University of Wyoming
Ivinson 237
[EMAIL PROTECTED]
Phone: (307) 766-2815
Fax: (307) 766-2984

-Original Message-
From: John Watters [mailto:[EMAIL PROTECTED] 
Sent: Friday, February 04, 2005 2:15 PM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: Re: [WIRELESS-LAN] Wireless Identification Tools

Where can we find a good list of the MAC address ranges for wireless
access points? If I just look
by manufacturer (see http://standards.ieee.org/regauth/oui/index.shtml)
I do not see a distinction
between their access points & their NICs, switches, routers, and other
network equipment?

-jcw



> To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
> From: Jeff Wolfe <[EMAIL PROTECTED]>
> Date: Fri, 4 Feb 2005 15:53:26 -0500
> Subject: Re: [WIRELESS-LAN] Wireless Identification Tools
> Reply-To: "802.11 wireless issues listserv"

> Return-Path: <[EMAIL PROTECTED]>
> Message-ID: <[EMAIL PROTECTED]>
> In-Reply-To: <[EMAIL PROTECTED]>
> References: <[EMAIL PROTECTED]>
> <[EMAIL PROTECTED]>
> Content-Type: text/plain; charset=ISO-8859-1; format=flowed
> Received: from listserv.educause.edu (isaco2.educause.edu
[198.59.61.25])
>   by bama.ua.edu (8.12.10/8.12.10) with ESMTP id j14L4pbL000857
>   for <[EMAIL PROTECTED]>; Fri, 4 Feb 2005 15:04:52 -0600 (CST)
> Sender: "802.11 wireless issues listserv"

> MIME-Version: 1.0
> Content-Transfer-Encoding: 7bit
>
> Philippe Hanset wrote:
> > Don,
> >
> > A trick that I have been willing to test for a long time would be
> > to join the Rogue AP, send traffic to a know sniffing host
> > in that same layer2 network.
> > This will reveal the Wired MAC address of the AP.
> > Then search for that MAC on your wired side and disable the port.
> > (if you have a good circuit-to-switchport DB, you know the location
as
> > well)
> > If the AP doesn't allow guests, we use Directional Antennas
> > and Wireless Sniffers as you mentioned.
> >
> > And as I have mentioned before: we rarely have Rogue APs
> > in places were we provide decent Free Wireless coverage!
>
> We've been able to have good luck by searching our switch FDBs for MAC
> addresses matching all but the last octet of the MAC address in the
> rogue AP's beacon. More often than not, manufacturers use sequential
MAC
> addresses for the wired and wireless ports of their devices. Of the 5
or
> 6 rogues we've seen over the last year, all were locatable that way.
>
> YMMV.. :)
>
>
> -JEff
>
> **
> Participation and subscription information for this EDUCAUSE
Constituent Group discussion list
> can be found at http://www.educause.edu/groups/.
>





John Watters  UA: Office of Information Technology  205-348-3992

**
Participation and subscription information for this EDUCAUSE Constituent
Group discussion list can be found at http://www.educause.edu/groups/.

**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.


Re: [WIRELESS-LAN] Wireless Identification Tools

2005-02-04 Thread John Watters
Where can we find a good list of the MAC address ranges for wireless access 
points? If I just look
by manufacturer (see http://standards.ieee.org/regauth/oui/index.shtml) I do 
not see a distinction
between their access points & their NICs, switches, routers, and other network 
equipment?

-jcw



> To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
> From: Jeff Wolfe <[EMAIL PROTECTED]>
> Date: Fri, 4 Feb 2005 15:53:26 -0500
> Subject: Re: [WIRELESS-LAN] Wireless Identification Tools
> Reply-To: "802.11 wireless issues listserv"  
> 
> Return-Path: <[EMAIL PROTECTED]>
> Message-ID: <[EMAIL PROTECTED]>
> In-Reply-To: <[EMAIL PROTECTED]>
> References: <[EMAIL PROTECTED]>
> <[EMAIL PROTECTED]>
> Content-Type: text/plain; charset=ISO-8859-1; format=flowed
> Received: from listserv.educause.edu (isaco2.educause.edu [198.59.61.25])
>   by bama.ua.edu (8.12.10/8.12.10) with ESMTP id j14L4pbL000857
>   for <[EMAIL PROTECTED]>; Fri, 4 Feb 2005 15:04:52 -0600 (CST)
> Sender: "802.11 wireless issues listserv"  
> 
> MIME-Version: 1.0
> Content-Transfer-Encoding: 7bit
>
> Philippe Hanset wrote:
> > Don,
> >
> > A trick that I have been willing to test for a long time would be
> > to join the Rogue AP, send traffic to a know sniffing host
> > in that same layer2 network.
> > This will reveal the Wired MAC address of the AP.
> > Then search for that MAC on your wired side and disable the port.
> > (if you have a good circuit-to-switchport DB, you know the location as
> > well)
> > If the AP doesn't allow guests, we use Directional Antennas
> > and Wireless Sniffers as you mentioned.
> >
> > And as I have mentioned before: we rarely have Rogue APs
> > in places were we provide decent Free Wireless coverage!
>
> We've been able to have good luck by searching our switch FDBs for MAC
> addresses matching all but the last octet of the MAC address in the
> rogue AP's beacon. More often than not, manufacturers use sequential MAC
> addresses for the wired and wireless ports of their devices. Of the 5 or
> 6 rogues we've seen over the last year, all were locatable that way.
>
> YMMV.. :)
>
>
> -JEff
>
> **
> Participation and subscription information for this EDUCAUSE Constituent 
> Group discussion list
> can be found at http://www.educause.edu/groups/.
>





John Watters  UA: Office of Information Technology  205-348-3992

**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.


Re: [WIRELESS-LAN] Wireless Identification Tools

2005-02-04 Thread Jeff Wolfe
Philippe Hanset wrote:
Don,
A trick that I have been willing to test for a long time would be
to join the Rogue AP, send traffic to a know sniffing host
in that same layer2 network.
This will reveal the Wired MAC address of the AP.
Then search for that MAC on your wired side and disable the port.
(if you have a good circuit-to-switchport DB, you know the location as
well)
If the AP doesn't allow guests, we use Directional Antennas
and Wireless Sniffers as you mentioned.
And as I have mentioned before: we rarely have Rogue APs
in places were we provide decent Free Wireless coverage!
We've been able to have good luck by searching our switch FDBs for MAC
addresses matching all but the last octet of the MAC address in the
rogue AP's beacon. More often than not, manufacturers use sequential MAC
addresses for the wired and wireless ports of their devices. Of the 5 or
6 rogues we've seen over the last year, all were locatable that way.
YMMV.. :)
-JEff
**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.


Re: [WIRELESS-LAN] Wireless Identification Tools

2005-02-04 Thread Philippe Hanset
Don,

A trick that I have been willing to test for a long time would be
to join the Rogue AP, send traffic to a know sniffing host
in that same layer2 network.
This will reveal the Wired MAC address of the AP.
Then search for that MAC on your wired side and disable the port.
(if you have a good circuit-to-switchport DB, you know the location as
well)
If the AP doesn't allow guests, we use Directional Antennas
and Wireless Sniffers as you mentioned.

And as I have mentioned before: we rarely have Rogue APs
in places were we provide decent Free Wireless coverage!

Philippe Hanset
University of Tennessee

On Fri, 4 Feb 2005, Donald Gallerie wrote:

> In an effort to better identify rogue access points, can any of you
> recommend tools that would make the physical and network pinpointing of WAPs
> a bit easier.  We have identified a number of rogues but cannot ascertain
> exactly where they are.  We have tried getting the mac address from the
> wireless side and doing an arp lookup but oftentimes they are running NAT
> and the mac on the wired side is different.
>
> We would like to sweep the campus and get as much information as we can
> in a single pass (automatic documentation features would also be useful).  I
> had thought about using a directional antenna and netstumbler but thought
> others may have found other, more user friendly tools.
>
> Any recommendations?
>
> Don Gallerie
> Assistance Director
> Telecommunications
> The University at Albany
>
> **
> Participation and subscription information for this EDUCAUSE Constituent 
> Group discussion list can be found at http://www.educause.edu/groups/.
>

**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.


Innerwireless Distributed Antenna System?

2005-02-04 Thread Zeller, Tom S
Title: WIRELESS-LAN Digest - 1 Feb 2005 to 2 Feb 2005 (#2005-13)



We had a 
presentation on this from Johnson Controls yesterday.  My RF-oriented 
colleagues thought it was a good idea in many ways.  We didn't get as 
deep as pricing but suspect we won't be willing to pay what it takes.  I 
suspect the ROI only works if you have multiple wireless systems that are 
important to you (only guessing though).  Doing this just for WiFi may not 
make sense.  So, sure, it would be nice if the two-way radios used by field 
personnel of various sorts worked everywhere, but how much money is that 
worth.  Another problem is that no one entity is responsible for all the 
wireless services that might benefit.
 
One 
interesting aspect was the capability to work with one or more cellular carriers 
to plug into the system so everyone's cell phone would work in such 
buildings.  Theoretically you could get a carrier to pay YOU to put their 
stuff in large dorms due to the thousands of customers that would come their 
way.
 
Tom 
Zeller
Indiana 
University
[EMAIL PROTECTED]
**
Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at http://www.educause.edu/groups/.


RE: [WIRELESS-LAN] Wireless Identification Tools

2005-02-04 Thread Yantis, Jonathan Lindsey
That is true about disrupting the hubs in offices, but that battle has
already been waged on our network for the most part (and we won).  You
are right about the NAT part, it doesn't fix the problem with the NAT
gateways but it does fix basic APs handing out campus addresses and a
few other problems we had in addition to our other tools.  YMMV

 -- Jonathan Yantis - [EMAIL PROTECTED] - (843-953-7770)

-Original Message-
From: 802.11 wireless issues listserv
[mailto:[EMAIL PROTECTED] On Behalf Of Michael Dickson
Sent: Friday, February 04, 2005 3:14 PM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: Re: [WIRELESS-LAN] Wireless Identification Tools

Using port security tends to open a can of worms with faculty and TA's
who use hubs in overcrowded offices. Also, it does not defend against
rogue AP's or other devices doing NAT, as only a single mac is seen on
the switch.

   Mike

***
Michael Dickson Phone: 413-545-9639
Network Analyst Fax:   413-545-3203
University of Massachusetts Email: [EMAIL PROTECTED]
Network Systems and Services
***

Yantis, Jonathan Lindsey wrote:
> One way we have found to mitigate rouge APs (and this only works on
> newer networks) is through port security.  I you are running cisco
2950s
> or newer on your wired lan, you can use this method to restrict each
> port on your lan to a single device and this in turn knocks off any
> associated clients to an AP since the AP itself takes up one mac
> address.
>
> We use the following port level commands:
>
> switchport mode access
>  switchport port-security
>  switchport port-security aging time 1
>  switchport port-security violation restrict
>
>
> This lets users disconnect their desktops and plug up a laptop if they
> want, but it still restricts the port to one mac address per 1min
> interval.
>
>
> I know this isn't exactly what you were looking for but it is one more
> way we have found to make things easier.  It also knocks off consumer
> hubs and switches too.  Other than that, we do like you, ministumbler
on
> an ipaq or netstumbler on windows (or kismet on linux).
>
>
>  -- Jonathan Yantis - [EMAIL PROTECTED] - (843-953-7770)
>
> -Original Message-
> From: 802.11 wireless issues listserv
> [mailto:[EMAIL PROTECTED] On Behalf Of Donald
Gallerie
> Sent: Friday, February 04, 2005 2:17 PM
> To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
> Subject: [WIRELESS-LAN] Wireless Identification Tools
>
> In an effort to better identify rogue access points, can any of you
> recommend tools that would make the physical and network pinpointing
of
> WAPs
> a bit easier.  We have identified a number of rogues but cannot
> ascertain
> exactly where they are.  We have tried getting the mac address from
the
> wireless side and doing an arp lookup but oftentimes they are running
> NAT
> and the mac on the wired side is different.
>
> We would like to sweep the campus and get as much information as we
can
> in a single pass (automatic documentation features would also be
> useful).  I
> had thought about using a directional antenna and netstumbler but
> thought
> others may have found other, more user friendly tools.
>
> Any recommendations?
>
> Don Gallerie
> Assistance Director
> Telecommunications
> The University at Albany
>
> **
> Participation and subscription information for this EDUCAUSE
Constituent
> Group discussion list can be found at http://www.educause.edu/groups/.
>
> **
> Participation and subscription information for this EDUCAUSE
Constituent Group discussion list can be found at
http://www.educause.edu/groups/.

**
Participation and subscription information for this EDUCAUSE Constituent
Group discussion list can be found at http://www.educause.edu/groups/.

**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.


802.1x, news

2005-02-04 Thread Philippe Hanset
http://www.securew2.com

is now open-source, supporting 802.1x with EAP-TTLS for Windows
XP/2000/CE.

A good complement to the existing open-source
development from http://www.open1x.org
(supports POSIX OSes)

Philippe Hanset
University of Tennessee

On Fri, 4 Feb 2005, Michael Dickson wrote:

> Using port security tends to open a can of worms with faculty and TA's
> who use hubs in overcrowded offices. Also, it does not defend against
> rogue AP's or other devices doing NAT, as only a single mac is seen on
> the switch.
>
>Mike
>
> ***
> Michael Dickson Phone: 413-545-9639
> Network Analyst Fax:   413-545-3203
> University of Massachusetts Email: [EMAIL PROTECTED]
> Network Systems and Services
> ***
>
> Yantis, Jonathan Lindsey wrote:
> > One way we have found to mitigate rouge APs (and this only works on
> > newer networks) is through port security.  I you are running cisco 2950s
> > or newer on your wired lan, you can use this method to restrict each
> > port on your lan to a single device and this in turn knocks off any
> > associated clients to an AP since the AP itself takes up one mac
> > address.
> >
> > We use the following port level commands:
> >
> > switchport mode access
> >  switchport port-security
> >  switchport port-security aging time 1
> >  switchport port-security violation restrict
> >
> >
> > This lets users disconnect their desktops and plug up a laptop if they
> > want, but it still restricts the port to one mac address per 1min
> > interval.
> >
> >
> > I know this isn't exactly what you were looking for but it is one more
> > way we have found to make things easier.  It also knocks off consumer
> > hubs and switches too.  Other than that, we do like you, ministumbler on
> > an ipaq or netstumbler on windows (or kismet on linux).
> >
> >
> >  -- Jonathan Yantis - [EMAIL PROTECTED] - (843-953-7770)
> >
> > -Original Message-
> > From: 802.11 wireless issues listserv
> > [mailto:[EMAIL PROTECTED] On Behalf Of Donald Gallerie
> > Sent: Friday, February 04, 2005 2:17 PM
> > To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
> > Subject: [WIRELESS-LAN] Wireless Identification Tools
> >
> > In an effort to better identify rogue access points, can any of you
> > recommend tools that would make the physical and network pinpointing of
> > WAPs
> > a bit easier.  We have identified a number of rogues but cannot
> > ascertain
> > exactly where they are.  We have tried getting the mac address from the
> > wireless side and doing an arp lookup but oftentimes they are running
> > NAT
> > and the mac on the wired side is different.
> >
> > We would like to sweep the campus and get as much information as we can
> > in a single pass (automatic documentation features would also be
> > useful).  I
> > had thought about using a directional antenna and netstumbler but
> > thought
> > others may have found other, more user friendly tools.
> >
> > Any recommendations?
> >
> > Don Gallerie
> > Assistance Director
> > Telecommunications
> > The University at Albany
> >
> > **
> > Participation and subscription information for this EDUCAUSE Constituent
> > Group discussion list can be found at http://www.educause.edu/groups/.
> >
> > **
> > Participation and subscription information for this EDUCAUSE Constituent 
> > Group discussion list can be found at http://www.educause.edu/groups/.
>
> **
> Participation and subscription information for this EDUCAUSE Constituent 
> Group discussion list can be found at http://www.educause.edu/groups/.
>

**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.


Re: [WIRELESS-LAN] Wireless Identification Tools

2005-02-04 Thread Bill Lawrence
Airmagnet laptop or handheld will work.
At 02:16 PM 2/4/2005, you wrote:
In an effort to better identify rogue access points, can any of you
recommend tools that would make the physical and network pinpointing of WAPs
a bit easier.  We have identified a number of rogues but cannot ascertain
exactly where they are.  We have tried getting the mac address from the
wireless side and doing an arp lookup but oftentimes they are running NAT
and the mac on the wired side is different.
We would like to sweep the campus and get as much information as we can
in a single pass (automatic documentation features would also be useful).  I
had thought about using a directional antenna and netstumbler but thought
others may have found other, more user friendly tools.
Any recommendations?
Don Gallerie
Assistance Director
Telecommunications
The University at Albany
**
Participation and subscription information for this EDUCAUSE Constituent
Group discussion list can be found at http://www.educause.edu/groups/.
--
Bill Lawrence RCDD, LAN Specialist
Georgia Institute of Technology
Office of Information Technology
258 4th Street NW
Atlanta, GA 30332-0715
Phone: 404-894-9504 Fax: 404-894-3599
**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.


Re: [WIRELESS-LAN] Wireless Identification Tools

2005-02-04 Thread Michael Dickson
Using port security tends to open a can of worms with faculty and TA's
who use hubs in overcrowded offices. Also, it does not defend against
rogue AP's or other devices doing NAT, as only a single mac is seen on
the switch.
  Mike
***
Michael Dickson Phone: 413-545-9639
Network Analyst Fax:   413-545-3203
University of Massachusetts Email: [EMAIL PROTECTED]
Network Systems and Services
***
Yantis, Jonathan Lindsey wrote:
One way we have found to mitigate rouge APs (and this only works on
newer networks) is through port security.  I you are running cisco 2950s
or newer on your wired lan, you can use this method to restrict each
port on your lan to a single device and this in turn knocks off any
associated clients to an AP since the AP itself takes up one mac
address.
We use the following port level commands:
switchport mode access
 switchport port-security
 switchport port-security aging time 1
 switchport port-security violation restrict
This lets users disconnect their desktops and plug up a laptop if they
want, but it still restricts the port to one mac address per 1min
interval.
I know this isn't exactly what you were looking for but it is one more
way we have found to make things easier.  It also knocks off consumer
hubs and switches too.  Other than that, we do like you, ministumbler on
an ipaq or netstumbler on windows (or kismet on linux).
 -- Jonathan Yantis - [EMAIL PROTECTED] - (843-953-7770)
-Original Message-
From: 802.11 wireless issues listserv
[mailto:[EMAIL PROTECTED] On Behalf Of Donald Gallerie
Sent: Friday, February 04, 2005 2:17 PM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: [WIRELESS-LAN] Wireless Identification Tools
In an effort to better identify rogue access points, can any of you
recommend tools that would make the physical and network pinpointing of
WAPs
a bit easier.  We have identified a number of rogues but cannot
ascertain
exactly where they are.  We have tried getting the mac address from the
wireless side and doing an arp lookup but oftentimes they are running
NAT
and the mac on the wired side is different.
We would like to sweep the campus and get as much information as we can
in a single pass (automatic documentation features would also be
useful).  I
had thought about using a directional antenna and netstumbler but
thought
others may have found other, more user friendly tools.
Any recommendations?
Don Gallerie
Assistance Director
Telecommunications
The University at Albany
**
Participation and subscription information for this EDUCAUSE Constituent
Group discussion list can be found at http://www.educause.edu/groups/.
**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.
**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.


RE: [WIRELESS-LAN] Wireless Identification Tools

2005-02-04 Thread Yantis, Jonathan Lindsey
One way we have found to mitigate rouge APs (and this only works on
newer networks) is through port security.  I you are running cisco 2950s
or newer on your wired lan, you can use this method to restrict each
port on your lan to a single device and this in turn knocks off any
associated clients to an AP since the AP itself takes up one mac
address.

We use the following port level commands:

switchport mode access
 switchport port-security
 switchport port-security aging time 1
 switchport port-security violation restrict


This lets users disconnect their desktops and plug up a laptop if they
want, but it still restricts the port to one mac address per 1min
interval. 


I know this isn't exactly what you were looking for but it is one more
way we have found to make things easier.  It also knocks off consumer
hubs and switches too.  Other than that, we do like you, ministumbler on
an ipaq or netstumbler on windows (or kismet on linux).


 -- Jonathan Yantis - [EMAIL PROTECTED] - (843-953-7770)

-Original Message-
From: 802.11 wireless issues listserv
[mailto:[EMAIL PROTECTED] On Behalf Of Donald Gallerie
Sent: Friday, February 04, 2005 2:17 PM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: [WIRELESS-LAN] Wireless Identification Tools

In an effort to better identify rogue access points, can any of you
recommend tools that would make the physical and network pinpointing of
WAPs
a bit easier.  We have identified a number of rogues but cannot
ascertain
exactly where they are.  We have tried getting the mac address from the
wireless side and doing an arp lookup but oftentimes they are running
NAT
and the mac on the wired side is different.

We would like to sweep the campus and get as much information as we can
in a single pass (automatic documentation features would also be
useful).  I
had thought about using a directional antenna and netstumbler but
thought
others may have found other, more user friendly tools.

Any recommendations?

Don Gallerie
Assistance Director
Telecommunications
The University at Albany

**
Participation and subscription information for this EDUCAUSE Constituent
Group discussion list can be found at http://www.educause.edu/groups/.

**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.


Wireless Identification Tools

2005-02-04 Thread Donald Gallerie
In an effort to better identify rogue access points, can any of you
recommend tools that would make the physical and network pinpointing of WAPs
a bit easier.  We have identified a number of rogues but cannot ascertain
exactly where they are.  We have tried getting the mac address from the
wireless side and doing an arp lookup but oftentimes they are running NAT
and the mac on the wired side is different.

We would like to sweep the campus and get as much information as we can
in a single pass (automatic documentation features would also be useful).  I
had thought about using a directional antenna and netstumbler but thought
others may have found other, more user friendly tools.

Any recommendations?

Don Gallerie
Assistance Director
Telecommunications
The University at Albany

**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.