[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Detection of Rogue Access Points
SSL throughout the network, with access control enforced using certificates
is certainly a good idea.
But most of the problem you face is metrics and inventory control of
authorized devices. Commercial WIPS gear does a lot of this heavy lifting
without your having to script it all yourself.
On Monday, October 15, 2012, Jimmy Hess wrote:
> A NAT device is one example.....
> another example of an unauthorized device could be an unauthorized
> hardware keylogger/ network backdoor, with unauthorized connectivity to
> the LAN, and
> possible covert channels/backdoors/firewall bypasses.
>
>
--
Suresh Ramasubramanian (ops.lists at gmail.com)