There aren't any easy answers, but both AirTight Networks (a startup) and AirDefense play their wireless and wireside detection and mitigation algorithms quite strongly. In fact, all the wireless security vendors, including Red M and AirMagnet will make some mention of 'proprietary' or 'patented' in regards to their detection algorithms.
AirTight doesn't require any proprietary hardware for their wireside detection (AirDefense uses a Linux-base appliance to host their distributed version), so perhaps it's worth it to ask them for a 30-day trial and see if they prove their worth. http://www.airtightnetworks.net/products/products-spectraguard.html Regards, Frank -----Original Message----- From: 802.11 wireless issues listserv [mailto:[EMAIL PROTECTED] On Behalf Of Donald Gallerie Sent: Friday, February 04, 2005 1:17 PM To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU Subject: [WIRELESS-LAN] Wireless Identification Tools In an effort to better identify rogue access points, can any of you recommend tools that would make the physical and network pinpointing of WAPs a bit easier. We have identified a number of rogues but cannot ascertain exactly where they are. We have tried getting the mac address from the wireless side and doing an arp lookup but oftentimes they are running NAT and the mac on the wired side is different. We would like to sweep the campus and get as much information as we can in a single pass (automatic documentation features would also be useful). I had thought about using a directional antenna and netstumbler but thought others may have found other, more user friendly tools. Any recommendations? Don Gallerie Assistance Director Telecommunications The University at Albany ********** Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at http://www.educause.edu/groups/. ********** Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at http://www.educause.edu/groups/.