Discovery of rogue access point location in wireless network environments
First Claim
1. In a wireless network environment comprising at least one authorized access point connected to a wired computer network, a method for detecting whether a rogue access point is connected to the wired computer network, comprisingdetecting a rogue access point,identifying at least one authorized access point that neighbors the rogue access point;
- selecting an authorized access point from the at least one authorized access point in the identifying step;
establishing a wireless connection between the selected authorized access point and the rogue access point;
wirelessly transmitting a rogue location discovery packet from the selected authorized access point to the rogue access point, wherein the rogue location discovery packet is addressed to a network device connected to the computer network;
monitoring for receipt of the rogue location discovery packet at the network device.
3 Assignments
0 Petitions
Accused Products
Abstract
Methods, apparatuses and systems facilitating location or containment of rogue or unauthorized access points on wireless computer network environments. Embodiments of the present invention support one to a plurality of rogue containment methodologies. A first rogue containment type involves identification of the physical connection of the rogue access point to the wired network infrastructure and, thus, allows for disabling of that physical connection to contain the rogue access point. Other rogue containment methods involve wireless techniques for containing the effect of rogue access points. In some embodiments, the present invention provides methods, apparatuses and systems facilitating network location of rogue access points to determine whether one or more rogue containment methodologies should be applied. As discussed below, the rogue location and containment functionality described herein can be applied to a wide variety of wireless network system architectures.
-
Citations
29 Claims
-
1. In a wireless network environment comprising at least one authorized access point connected to a wired computer network, a method for detecting whether a rogue access point is connected to the wired computer network, comprising
detecting a rogue access point, identifying at least one authorized access point that neighbors the rogue access point; -
selecting an authorized access point from the at least one authorized access point in the identifying step; establishing a wireless connection between the selected authorized access point and the rogue access point; wirelessly transmitting a rogue location discovery packet from the selected authorized access point to the rogue access point, wherein the rogue location discovery packet is addressed to a network device connected to the computer network; monitoring for receipt of the rogue location discovery packet at the network device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. In a wireless network environment comprising at least one authorized access point connected to a wired computer network, the wired computer network including dynamic network address assignment functionality, a method for detecting whether a rogue access point is connected to the wired computer network, comprising
detecting a rogue access point, identifying at least one authorized access point that neighbors the rogue access point; -
selecting an authorized access point from the at least one authorized access point in the identifying step; establishing a wireless connection between the selected authorized access point and the rogue access point; obtaining a dynamic computer network address for the selected authorized access point; wirelessly transmitting a rogue location discovery packet from the selected authorized access point to the rogue access point, wherein the rogue location discovery packet is logically addressed to a network device connected to the computer network; monitoring for receipt of the rogue location discovery packet at the network device. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. In a wireless network environment comprising at least one authorized access point connected to a wired computer network, the wired computer network including dynamic network address assignment functionality, a method for detecting whether a rogue access point is connected to the wired computer network, comprising
detecting a rogue access point, observing at least one data frame including a logical network address of a wireless client associated with the rogue access point; -
selecting a logical network address identified in the observing step; identifying at least one authorized access point that neighbors the rogue access point; selecting an authorized access point from the at least one authorized access point in the identifying step; establishing a wireless connection between the selected authorized access point and the rogue access point; wirelessly transmitting a rogue location discovery packet from the selected authorized access point to the rogue access point, wherein the rogue location discovery packet is logically addressed to a network device connected to the computer network; and
wherein the source address of the rogue location discovery packet is set to the logical network address of the selected wireless client; andmonitoring for receipt of the rogue location discovery packet at the network device.
-
-
19. In a computer network environment comprising a wired computer network implemented by at least one network device operative to switch or route data units between devices connected thereto, the data units including a source address and a destination address, wherein the at least one network device comprises at least two ports to which other devices connect, and wherein the at least one network device is operative to store the source addresses of the data units encountered at the ports of the at least one network device, a method for network location of a rogue access point, comprising
detecting a rogue access point, determining the address of at least one rogue client associated with the rogue access point; - and
querying, using the addresses of the at least one rogue client in the determining step, the at least one network device for the port at which data units sourced from the at least one rogue client were encountered. - View Dependent Claims (20, 21, 22)
- and
-
23. A wireless network system facilitating network location of rogue systems, comprising
a plurality of access elements for wireless communication with at least one remote client element and for communication with a central control element; a central control element for supervising at least one of said access elements, wherein the central control element is operative to manage and control the wireless connections between the access elements and corresponding remote client elements;
the central control element including the at least one network interface operatively connected to a wired computer network; andwherein the access elements are each operative to; establish and maintain, in an access point mode, wireless connections with remote client elements; and wherein the access elements, under control of the central control element are further operative to; establish a wireless connection to a detected rogue access point; transmit a rogue location discovery packet to the detected rogue access point, wherein the destination address of the rogue location discovery packet is set to the central control element; and wherein the central control element is operative to; monitor for receipt of rogue location discovery packets on the network interface. - View Dependent Claims (24, 25, 26, 27, 28, 29)
Specification