LANtools network management
218
5.8
Visualization of larger WLANs
BAT54-Rail/F..
Release
7.54
06/08
D An example of rogue APs are access points that a company's employees
connect to the network without the knowledge or permission of the system
administrators, thereby consciously or unconsciously making the network
vulnerable to potential attackers via unsecured WLAN access. Not quite
as dangerous, but disruptive all the same are access points that belong
to third-party networks yet are within the range of the local WLAN. If such
devices also use the same SSID and channel as the local AP (default set-
tings), then local clients could attempt to log on to external networks.
Unidentified access points within the range of the local network frequently
pose a possible threat and security gap. At the very least they are a distur-
bance, and so they need to be identified to decide whether further measures
in securing the local network need to be introduced. Information about the cli-
ents within range of your network is automatically stored to an internal table
in the BAT Wireless Router. Once activated, background scanning records
neighboring access points and records them to the scan table. WLANmonitor
presents this information visually. The access points and clients found can
be categorized in groups such as 'known', 'unknown' or 'rogue'.
Note: Further information can be found under ’Background WLAN scanning’
→ page 49.
U Rogue AP detection
The WLANmonitor sorts all of the access points found into predefined sub-
groups under 'Rogue AP Detection' while displaying the following informa-
tion:
D Time of first and last detection
D BSSID, the MAC addresse of the AP for this WLAN network
D Network name
D Type of encryption used
D Frequency band used
D Radio channel used
D Use of 108Mbps mode
Note: To use rogue AP detection, background scanning has to be activated
in the BAT Wireless Router.
The WLANmonitor uses the following groups for sorting the APs that are
found:
D All APs: List of all scanned WLAN networks grouped as follows
D New APs: New unknown and unconfigured WLAN networks are automat-
ically grouped here (APs displayed in yellow)