?
Solved

Need your suggestions on how to monitor or prevent people from plugging in wireless routers into company network?

Posted on 2008-06-18
5
Medium Priority
?
204 Views
Last Modified: 2010-04-17
Need your solutions on how to monitor/prevent people from plugging in wireless routers into company network?  Network is all cisco routers with dhcp on.  The solution should be easy to implement and cost nothing extra than some time to implement.
0
Comment
Question by:johnvvu
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
5 Comments
 
LVL 4

Expert Comment

by:albuitra
ID: 21816838
You can use the mac address
You have to permit only those macs acces to the wireless network
and use some password hard to guess
0
 
LVL 17

Expert Comment

by:Andres Perales
ID: 21816839
If you are running Cisco Switches as well on your LAN, you can enable port security for those switches.  This will require you to get the mac addresses of all authorized systems.  Once you have that then you implement port security.  Only devices with valid mac addresses in the tables will be allowed to connect.
0
 

Author Comment

by:johnvvu
ID: 21817054
Any way to identify wireless routers by their mac address so I can deny them access?
0
 
LVL 17

Accepted Solution

by:
Andres Perales earned 750 total points
ID: 21817103
you don't have to deny them access, if those mac addresses aren't in the allow talbe that port won't even light up...or be turned on...all device mac addresses have to be in your tables for those devices to work.  maybe this read will make a little more sense than me...LOL

http://articles.techrepublic.com.com/5100-10878_11-6123047.html
0
 

Author Comment

by:johnvvu
ID: 21817124
Very Good article! Awesome!
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Problem Description:   Couple of months ago we upgraded the ADSL line at our branch office from Home to Business line. The purpose of transforming the service to have static public IP’s. We were in need for public IP’s to publish our web resour…
Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question