There are two things that you need to think of and I’m sure different vendors call it different things, so let me go in depth on this.
One method is to find a access point that has been plugged into the switching system of a network. Think, a business that someone plugged in a Linksys to or something. This is accomplished typically, by sending that access point data, and seeing what “swtichport” it comes in on, then turning off that switch port. THIS IS ALLOWED. Basically detecting that a rouge AP is on managed or switched infrastructure. This would NOT affect any kind of personal hotspot, such as a LTE hotspot, as there is no port to turn off, and there for the access point would operate normally, but it would also not be considered a rouge access point. The other kind, is the one most people think of, find a rouge AP that should not be out there, and send a deauth attack to prevent it from using up air time and prevent people from using it. In this manner, the access point can’t operator due to directed harmful interference, the deauth attack. This is NOT ALLOWED. This would be like me brining in a LTE hotspot setting it on the office desk and surfing with my cell phone or laptop on it vs the corp network. Eric, maybe you can fill us in on what the two features are called on Ruckus so that we know what their names are so that we don’t get them confused. Dennis Burgess, CTO, Link Technologies, Inc. den...@linktechs.net <mailto:den...@linktechs.net> – 314-735-0270 – www.linktechs.net <http://www.linktechs.net> From: wireless-boun...@wispa.org [mailto:wireless-boun...@wispa.org] On Behalf Of Eric Albert Sent: Tuesday, January 06, 2015 10:16 AM To: WISPA General List Subject: Re: [WISPA] Rogue Accesspoint Detection Many commercial solutions, such as Ruckus Wireless (where I work) have Rouge AP Detection capability built into their APs or controllers. There is nothing nefarious or illegal surrounding this feature. Let me know if you'd like to talk further. Eric Albert MSO SE Ruckus Wireless On Tue, Jan 6, 2015 at 11:09 AM, Adair Winter <ada...@amarillowireless.net> wrote: a public place such as a hotel chain vs my private business where I needed to be able to control the wifi and keep things like wifi pineapples from snooping on my business would be not allowed? On Tue, Jan 6, 2015 at 10:05 AM, Dennis Burgess <dmburg...@linktechs.net> wrote: Note that many of these systems (rather rogue AP prevention) have been deemed illegal by the FCC, a hotel chain was fined 600k I think due to it. Dennis Burgess, CTO, Link Technologies, Inc. den...@linktechs.net – 314-735-0270 – www.linktechs.net From: wireless-boun...@wispa.org [mailto:wireless-boun...@wispa.org] On Behalf Of Scott Piehn Sent: Tuesday, January 06, 2015 9:49 AM To: WISPA General List Subject: [WISPA] Rogue Accesspoint Detection I have a customer that is being required to get rogue access point detection. not a one time thing but ongoing detection. What products have people used. --------------------------------------------------------- Scott M Piehn _______________________________________________ Wireless mailing list Wireless@wispa.org http://lists.wispa.org/mailman/listinfo/wireless -- Adair Winter VP, Network Operations / Owner Amarillo Wireless | 806.316.5071 C: 806.231.7180 http://www.amarillowireless.net <http://www.amarillowireless.net> _______________________________________________ Wireless mailing list Wireless@wispa.org http://lists.wispa.org/mailman/listinfo/wireless
_______________________________________________ Wireless mailing list Wireless@wispa.org http://lists.wispa.org/mailman/listinfo/wireless