Re: Rogue Wireless LANs [7:47287]

2002-07-05 Thread Ed
NetStumbler is good for War Driving and finding potential customers. And you don't have to hack or access someones network to do it. When you approach a potential customer that has an open access point, all that needs to be said is that you were doing a site survey for another customer in the

RE: Rogue Wireless LANs [7:47287]

2002-06-27 Thread Evans, TJ
-Original Message- From: Howard C. Berkowitz [mailto:[EMAIL PROTECTED]] Sent: Wednesday, June 26, 2002 4:02 PM To: [EMAIL PROTECTED] Subject: RE: Rogue Wireless LANs [7:47287] At 2:26 PM -0400 6/26/02, Dan Penn wrote: I think the take the company would take on it would depend highly on how

RE: Rogue Wireless LANs [7:47287]

2002-06-27 Thread Howard C. Berkowitz
of the current laws/policies/interpretations. Corrections always accepted ... Thanks! TJ -Original Message- From: Howard C. Berkowitz [mailto:[EMAIL PROTECTED]] Sent: Wednesday, June 26, 2002 4:02 PM To: [EMAIL PROTECTED] Subject: RE: Rogue Wireless LANs [7:47287] At 2:26 PM -0400 6/26/02, Dan

Re: Rogue Wireless LANs [7:47287]

2002-06-26 Thread Ken Diliberto
Agreed. This could be a big legal trap. If you use something like Network Stumbler, you're not actually using their network. You're just seeing the broadcasts from it. Maybe that would be a good approach. Ken Thomas E. Lawrence 06/25/02 11:09AM I realize you are speaking in jest, but for

RE: Rogue Wireless LANs [7:47287]

2002-06-26 Thread Dan Penn
it. Dan -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On Behalf Of Ken Diliberto Sent: Wednesday, June 26, 2002 11:04 AM To: [EMAIL PROTECTED] Subject: Re: Rogue Wireless LANs [7:47287] Agreed. This could be a big legal trap. If you use something like Network

RE: Rogue Wireless LANs [7:47287]

2002-06-26 Thread Howard C. Berkowitz
try this and approaches the company about it. Dan -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On Behalf Of Ken Diliberto Sent: Wednesday, June 26, 2002 11:04 AM To: [EMAIL PROTECTED] Subject: Re: Rogue Wireless LANs [7:47287] Agreed. This could be a big legal

Re: Rogue Wireless LANs [7:47287]

2002-06-25 Thread Neil Borne
The problem that I am coming accross is that some of my customers take the wireless gear outta the box and plug it in and when they figure that work with factory defaults they leave it alonethen all of a sudden someone pulls up in the front yard and starts snooping around. One thing you

Re: Rogue Wireless LANs [7:47287]

2002-06-25 Thread Stephen Manuel
wireless networking installed, 2 ignored me. HTH, Stephen Manuel - Original Message - From: Neil Borne To: Sent: Tuesday, June 25, 2002 8:52 AM Subject: Re: Rogue Wireless LANs [7:47287] The problem that I am coming accross is that some of my customers take the wireless gear

Re: Rogue Wireless LANs [7:47287]

2002-06-25 Thread Shawn Heisey
Pat, The 8th layer policy idea is good. I would take that one step further, after checking with your legal department to make sure they don't have a problem with it and that it's airtight: In addition to the disciplinary action up to and including termination clause, incorporate in company

Re: Rogue Wireless LANs [7:47287]

2002-06-25 Thread Priscilla Oppenheimer
the unsecure AP's, 1 denies having wireless networking installed, 2 ignored me. HTH, Stephen Manuel - Original Message - From: Neil Borne To: Sent: Tuesday, June 25, 2002 8:52 AM Subject: Re: Rogue Wireless LANs [7:47287] The problem that I am coming accross is that some of my customers

RE: Rogue Wireless LANs [7:47287]

2002-06-25 Thread Dan Penn
Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On Behalf Of Stephen Manuel Sent: Tuesday, June 25, 2002 10:02 AM To: [EMAIL PROTECTED] Subject: Re: Rogue Wireless LANs [7:47287] Neil and others, Recently I installed in my home a linksys wireless router/switch/ap, it works great, yes I

Re: Rogue Wireless LANs [7:47287]

2002-06-25 Thread John Golovich
I attended a Cisco Wireless update last month and came out of it with this information. Their updated WEP provides dynamic keys now. It is still crackable, but by the time it is cracked the key has regenerated. Also the keys are no longer hard coded into the device, since they are dynamic.

Re: Rogue Wireless LANs [7:47287]

2002-06-25 Thread Thomas E. Lawrence
en know they were running wireless such as this thread started out. Dan -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On Behalf Of Stephen Manuel Sent: Tuesday, June 25, 2002 10:02 AM To: [EMAIL PROTECTED] Subject: Re: Rogue Wireless LANs [7:47287] Neil an

RE: Rogue Wireless LANs [7:47287]

2002-06-25 Thread Howard C. Berkowitz
: Tuesday, June 25, 2002 10:02 AM To: [EMAIL PROTECTED] Subject: Re: Rogue Wireless LANs [7:47287] Neil and others, Recently I installed in my home a linksys wireless router/switch/ap, it works great, yes I have wep enabled. After installing the equipment, I became really interested in wireless

RE: Rogue Wireless LANs [7:47287]

2002-06-25 Thread Dan Penn
-Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On Behalf Of Dan Penn Sent: Tuesday, June 25, 2002 11:33 AM To: [EMAIL PROTECTED] Subject: RE: Rogue Wireless LANs [7:47287] You have given me an idea. All I need is a laptop now =) I would go war driving in the area

Re: Rogue Wireless LANs [7:47287]

2002-06-25 Thread Shawn Heisey
Question: Is Cisco's LEAP better than WEP? Does it have the same purpose but without some of the issues? I should know this, but I don't use Cisco for wireless (shame, shame). It's not that it's better than WEP, it just provides reasonably secure authentication and a bandaid for WEP's

Re: Rogue Wireless LANs [7:47287]

2002-06-25 Thread Chuck
Thomas E. Lawrence To: Sent: Tuesday, June 25, 2002 2:09 PM Subject: Re: Rogue Wireless LANs [7:47287] I realize you are speaking in jest, but for those who might consider this approach as a means of drumming up business, you may want to give some thought. Connecting to a network to which

Re: Rogue Wireless LANs [7:47287]

2002-06-25 Thread Howard C. Berkowitz
At 3:21 PM -0400 6/25/02, Stephen Manuel wrote: Tom, I'm not speaking jest, I have used netstumbler to find wireless networks that are wide open, some are in major companies. However, I turn off my client manager before I go wardriving, that way I don't accidentially connect to someone's

Re: Rogue Wireless LANs [7:47287]

2002-06-24 Thread chris
WEP for starters, then you can set the acccess point to only accept connections from specific MAC addresses. You can implement LEAP on the cisco AP, radius/tacacs+ requiring user/pass. Then you could place the AP outside the LAN/Firewall and require VPN to access the LAN resources. Cisco has

Re: Rogue Wireless LANs [7:47287]

2002-06-24 Thread Chuck
It's only a matter of time. It's bad enough they can buy their own servers and switches down at CompUSA and set up situations that can bring your network down while spanning tree runs.. 1) does your employer have a written security policy in place? Will your management enforce such a policy if

Re: Rogue Wireless LANs [7:47287]

2002-06-24 Thread John Golovich
What about restricting DHCP based on MAC Address. Problem is a lot more administration. --- Patrick Donlon wrote: I've just found a wireless LAN set up by someone in the building, I found it by chance when I was checking something with a colleague from another dept. The WLAN has zero

Re: Rogue Wireless LANs [7:47287]

2002-06-24 Thread Patrick Donlon
Thanks Chris, I was thinking more about securing the switch ports by authenticating mac's (probably a bit OTT) or using SNMP to check for new devices, any other ideas? I've already set up a wireless LAN here with WEP with authentication on an ACS server, which is a waste of time when you have

Re: Rogue Wireless LANs [7:47287]

2002-06-24 Thread Bob Timmons
Don't know if you know about this or not, but NetStumbler is a good freeware (begware) app for finding those rogue wireless apps that you might not know about. Check them out at: http://www.netstumbler.org/ What about restricting DHCP based on MAC Address. Problem is a lot more

Re: Rogue Wireless LANs [7:47287]

2002-06-24 Thread Ken Diliberto
When we find access points like that, we disable the switch port they connect to. We are using Network Stumbler to find rogue access points. Works well and it's free. Ken Patrick Donlon 06/24/02 08:48AM I've just found a wireless LAN set up by someone in the building, I found it by chance

Re: Rogue Wireless LANs [7:47287]

2002-06-24 Thread Priscilla Oppenheimer
At 11:54 AM 6/24/02, chris wrote: WEP for starters, then you can set the acccess point to only accept connections from specific MAC addresses. I don't think he was asking how to secure a wireless network. He was asking how to control non-IS user types from installing new equipment on the

Re: Rogue Wireless LANs [7:47287]

2002-06-24 Thread chris
Sorry misread the question, best option is to disable unused swithcports and resric them to mac, like you were mentioning. Chris Patrick Donlon wrote in message [EMAIL PROTECTED]">news:[EMAIL PROTECTED]... Thanks Chris, I was thinking more about securing the switch ports by authenticating

RE: Rogue Wireless LANs [7:47287]

2002-06-24 Thread [EMAIL PROTECTED]
] Subject: Re: Rogue Wireless LANs [7:47287] At 11:54 AM 6/24/02, chris wrote: WEP for starters, then you can set the acccess point to only accept connections from specific MAC addresses. I don't think he was asking how to secure a wireless network. He was asking how to control non-IS user types

Re: Rogue Wireless LANs [7:47287]

2002-06-24 Thread Kevin Cullimore
- Original Message - From: Priscilla Oppenheimer To: Sent: 24 June 2002 2:26 pm Subject: Re: Rogue Wireless LANs [7:47287] At 11:54 AM 6/24/02, chris wrote: WEP for starters, then you can set the acccess point to only accept connections from specific MAC addresses. I don't think