There aren't any easy answers, but both AirTight Networks (a startup) and
AirDefense play their wireless and wireside detection and mitigation
algorithms quite strongly.  In fact, all the wireless security vendors,
including Red M and AirMagnet will make some mention of 'proprietary' or
'patented' in regards to their detection algorithms.

AirTight doesn't require any proprietary hardware for their wireside
detection (AirDefense uses a Linux-base appliance to host their distributed
version), so perhaps it's worth it to ask them for a 30-day trial and see if
they prove their worth.
http://www.airtightnetworks.net/products/products-spectraguard.html

Regards,

Frank

-----Original Message-----
From: 802.11 wireless issues listserv
[mailto:[EMAIL PROTECTED] On Behalf Of Donald Gallerie
Sent: Friday, February 04, 2005 1:17 PM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: [WIRELESS-LAN] Wireless Identification Tools

In an effort to better identify rogue access points, can any of you
recommend tools that would make the physical and network pinpointing of WAPs
a bit easier.  We have identified a number of rogues but cannot ascertain
exactly where they are.  We have tried getting the mac address from the
wireless side and doing an arp lookup but oftentimes they are running NAT
and the mac on the wired side is different.

We would like to sweep the campus and get as much information as we can in a
single pass (automatic documentation features would also be useful).  I had
thought about using a directional antenna and netstumbler but thought others
may have found other, more user friendly tools.

Any recommendations?

Don Gallerie
Assistance Director
Telecommunications
The University at Albany

**********
Participation and subscription information for this EDUCAUSE Constituent
Group discussion list can be found at http://www.educause.edu/groups/.

**********
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.

Reply via email to