Motorola also has AirDefense as part of their portfolio.  Only difference is
that it can be installed without their WLAN solution (instead using
"sensors").

 

http://www.airdefense.net/products/servicesplatform/securitycompliance/secur
ity.php#eliminate

 

Daniel White

(303) 746-3590

 

From: [email protected] [mailto:[email protected]] On
Behalf Of Chuck Hogg
Sent: Monday, September 24, 2012 7:45 AM
To: WISPA General List
Subject: Re: [WISPA] Can they really do this?

 

Cisco has this functionality.  I would think if it were illegal, they would
be slapped pretty hard.

 

http://www.cisco.com/en/US/docs/wireless/ncs/1.0/configuration/guide/sol.htm
l#wp1040128 

 


Tagging and Containing Rogue Access Points


When the Cisco Unified Wireless Network Solution is monitored using NCS, NCS
generates the flags as rogue access point traps and displays the known rogue
access points by MAC address. The operator can then display a map showing
the location of the access points closest to each rogue access point. The
next step is to mark them as Known or Acknowledged rogue access points (no
further action), Alert rogue access points (watch for and notify when
active), or Contained rogue access points (have between one and four access
points discourage rogue access point clients by sending the clients
deauthenticate and disassociate messages whenever they associate with the
rogue access point).


Regards,
Chuck



On Mon, Sep 24, 2012 at 9:13 AM, Jon Auer <[email protected]> wrote:

As part of the WiFi standard a AP can tell a client to stop talking to it.
Rogue AP containment systems impersonate the targeted AP and send these
messages to observed clients. 

This kind of functionality is important in cases where you need to prevent
employees from accidentally creating security breaches. Ie by plugging their
cradlepoint into the network or not disabling the wifi in a time machine
NAS. 

On Sep 23, 2012 10:29 PM, "Doug Clark" <[email protected]> wrote:


If not with RF, how do you suppose that an AP would interfere with another
AP? That is what the poster is asking about.....

 

I am curious on how you would crack a WEP key without using RF signal.....

What you are talking about is criminal and your right breaking into secure
APs are not under the rules of Part-15. 

 

 

 

-------Original Message-------

 

From: Jeromie Reeves <mailto:[email protected]> 

Date: 9/23/2012 5:53:20 PM

To: WISPA General List <mailto:[email protected]> 

Subject: Re: [WISPA] Can they really do this?

 

IANAL but, I am fairly sure P15 only applies to RF, not to the OSI layers.
If the FCC does have control of the OSI layers from a P15 device then people
doing WEP cracking and such are in violation of P15 and that really is a
stretch. 

On Sat, Sep 22, 2012 at 6:19 AM, Doug Clark <[email protected]> wrote:


If there is an AP that does that and it is operating in Part15, it would be
directly in violation of the very rules that gave the device its right to
exist!

The major substance of Part-15 reads: This device complies with Part 15 of
the FCC Rules. Operation is subject to the following two conditions: (1)
this device may not cause harmful interference, and (2) this device must
accept any interference received, including interference that may cause
undesired operation.

 

If the poster has actually seen an AP that does what he says it does then it
would be in violation of Part 15 itself and thus an entity could lodge a
formal complaint against the

person or entity that was operating said AP and possibly end up with a
$25,000.00 ticket.  YMMV

 

 

 

 

-------Original Message-------

 

From: Greg Ihnen <mailto:[email protected]> 

Date: 9/22/2012 5:34:47 AM

To: WISPA General List <mailto:[email protected]> 

Subject: [WISPA] Can they really do this?

 

There's a current debate raging right now on the NANOG list about the ins
and outs of setting up large temporary networks for things like conventions.


 

This one post caught my attention. Has anyone heard of a WiFi AP that will
spoof neighboring networks to intentionally interfere with them, not by
occupying/jamming the spectrum in a brute force way, but rather by
impersonating the other network and rejecting new associations?

 

The quote:

 

> One of which I forgot to mention. Many of the hotels (I believe all
> Hilton properties at this time) have sold the facilities space for their
> wifi network to another company. They CAN'T negotiate it with you,
> because they don't own it any more. And most of these wifi networks have
> stealth killers enabled, so that they spoof any other wifi zone they see
> and send back reject messages to the clients. So you can't run them side
> by side.

 

Greg

 

  _____  

 

_______________________________________________
Wireless mailing list
[email protected]
http://lists.wispa.org/mailman/listinfo/wireless

 


                


_______________________________________________
Wireless mailing list
[email protected]
http://lists.wispa.org/mailman/listinfo/wireless

 

  _____  

 

_______________________________________________
Wireless mailing list
[email protected]
http://lists.wispa.org/mailman/listinfo/wireless

 


                


_______________________________________________
Wireless mailing list
[email protected]
http://lists.wispa.org/mailman/listinfo/wireless


_______________________________________________
Wireless mailing list
[email protected]
http://lists.wispa.org/mailman/listinfo/wireless

 

_______________________________________________
Wireless mailing list
[email protected]
http://lists.wispa.org/mailman/listinfo/wireless

Reply via email to