Protection of wireless network tracking and blocking rogue netplayers

Source: Internet
Author: User

AccessPoint may be created by a user to bring a laptop to the lounge and the user can still access the internet. An internal engineer may also installWirelessVro, build a test network by yourself, but you may forget to disable the wireless network after the test. These people who build unauthorized access points are often not malicious, but it cannot be said that these access points are harmless. If you think that attackers will not find wireless connections or use these connections, you may want to use Google to search for the dangers related to TJX and then check your network.

NetStumbler, Kismet, and other software tools are useful for identifying access points in a region, but they do not provide much information. Are you sure you want to ask, are these access points located on your network, on your company's network, or on a neighbor's network? Unless your organization is in a region with few units, these tools will not tell you all the required aspects. In short, these tools have limited functions.

Another option is to scan your network to see if there are abnormal MAC addresses. Although such scanning may be too time-consuming and may cause errors. This method is often used to scan the MAC addresses registered to devices such as D-Link. However, this method may not be effective because many large companies have acquired small vendors. For example, because Cisco acquired Linksys, the MAC address is displayed as Cisco. If you have a list of well-known MAC addresses in your organization, you can scan any device that has not been licensed. However, if you do not have a detailed list of devices, you cannot start. This method may not be too effective. Even if your network check is normal, MAC address scanning may not be effective. This is because the devices may move in the network, or the devices may not respond to the Ping operation, or the devices may turn off the power during scanning.

Some Wireless Access Point vendors have built the detection function of rogue access points into their products. This product can identify the Access Point Based on Wireless signals and track the AP through the network. This product can confirm the network port and allow you to control it. However, note that these products are not cheap.

No matter what technology or technique you use to track rogue access points, the key lies in regular searches. Pci dss (Payment Card Industry Data Security Standard) requires scanning every quarter, but we think it is better to search more frequently. You also need to be prepared for what measures should be taken after an unauthorized access point is discovered.

Be careful. If you need to build a test network, IT can take some time to provide a switch, and IT cannot be "killed by a stick ". Find a switch and move the connection over. If the user only needs wireless connection, disconnect the device and explain to him the risks that the device may bring to the company. A better solution is to see if you can establish an authorized wireless access in that place. Other users will like it very much. If you have not written a written policy on an unauthorized access point, do it with pleasure to allow the entire Organization to access the internet according to the security policy?

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.