Firewall Wizards mailing list archives
Re: Wireless
From: John McDermott <jjm () jkintl com>
Date: Fri, 09 Aug 2002 13:25:44 -0600
ejb3 () cornell edu wrote:
Spoofing MAC addresses is easy, even on 802.11b cards. Managing permitted MAC addresses is a good idea for home users with few cards and only a single base station. It's a management nightmare for large installations.
So what is the Best Practice approach to securing a wireless subnet? Given a WAP and n known cards, what is the best way to deal with MAC spoofing, wandering unauthorized users, etc. to prevent access to all lan resources for unauthorized users?
--john -- John McDermott Writer, Educator, Consultant jjm () jkintl com V +1 505/377-6293 F +1 505/377-6313 _______________________________________________ firewall-wizards mailing list firewall-wizards () honor icsalabs com http://honor.icsalabs.com/mailman/listinfo/firewall-wizards
Current thread:
- Wireless Paul Robertson (Aug 09)
- Re: Wireless R. DuFresne (Aug 09)
- Re: Wireless B. Scott Harroff (Aug 09)
- <Possible follow-ups>
- RE: Wireless Scott, Richard (Aug 09)
- RE: Wireless ejb3 (Aug 09)
- Re: Wireless Jeff Newton (Aug 09)
- Re: Wireless R. DuFresne (Aug 09)
- Re: Wireless Jeff Newton (Aug 09)
- RE: Wireless ejb3 (Aug 09)
- Re: Wireless John McDermott (Aug 09)
- Re: Wireless Paul Robertson (Aug 09)
- Re: Wireless Dave Piscitello (Aug 19)
- Re: Wireless ejb3 (Aug 09)
- Re: Wireless R. DuFresne (Aug 09)
- RE: Wireless Paul Robertson (Aug 09)