Discovery of rogue access point location in wireless network environments
First Claim
1. An apparatus comprisinga network interface, anda rogue containment module coupled to the network interface, wherein the rogue containment device is operative to:
- detect a rogue access point,identify at least one authorized access point that neighbors the rogue access point;
select an authorized access point from the at least one authorized access point in the identifying step;
instruct the selected authorized access point to establish a wireless connection between the selected authorized access point and the rogue access point;
cause the selected authorized access point to wirelessly transmit a rogue location discovery packet from the selected authorized access point to the rogue access point, wherein the rogue location discovery packet is addressed to a network device; and
monitor for receipt of the rogue location discovery packet at the network device.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods, apparatuses and systems facilitating location or containment of rogue or unauthorized access points on wireless computer network environments. Embodiments of the present invention support one to a plurality of rogue containment methodologies. A first rogue containment type involves identification of the physical connection of the rogue access point to the wired network infrastructure and, thus, allows for disabling of that physical connection to contain the rogue access point. Other rogue containment methods involve wireless techniques for containing the effect of rogue access points. In some embodiments, the present invention provides methods, apparatuses and systems facilitating network location of rogue access points to determine whether one or more rogue containment methodologies should be applied. As discussed below, the rogue location and containment functionality described herein can be applied to a wide variety of wireless network system architectures.
-
Citations
25 Claims
-
1. An apparatus comprising
a network interface, and a rogue containment module coupled to the network interface, wherein the rogue containment device is operative to: -
detect a rogue access point, identify at least one authorized access point that neighbors the rogue access point; select an authorized access point from the at least one authorized access point in the identifying step; instruct the selected authorized access point to establish a wireless connection between the selected authorized access point and the rogue access point; cause the selected authorized access point to wirelessly transmit a rogue location discovery packet from the selected authorized access point to the rogue access point, wherein the rogue location discovery packet is addressed to a network device; and monitor for receipt of the rogue location discovery packet at the network device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An apparatus comprising
a network interface, and a rogue containment module coupled to the network interface, wherein the rogue containment device is operative to: -
detect a rogue access point, select an authorized access point that neighbors the rogue access point, wherein the authorized access point is connected to a wired computer network, the wired computer network including dynamic network address assignment functionality; cause the selected authorized access point to obtain a dynamic computer network address, establish a wireless connection between the selected authorized access point and the rogue access point, and wirelessly transmit a rogue location discovery packet from the selected authorized access point to the rogue access point, wherein the rogue location discovery packet is logically addressed to a network device connected to the wired computer network; and monitor for receipt of the rogue location discovery packet at the network device. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. An apparatus comprising
a network interface, and a rogue containment module coupled to the network interface, wherein the rogue containment device is operative to: -
detect a rogue access point, observe at least one data frame including a logical network address of a wireless client associated with the rogue access point; select an identified logical network address; select an authorized access point that neighbors the rogue access point; causing the selected authorized access point to establish a wireless connection between the selected authorized access point and the rogue access point, and wirelessly transmit a rogue location discovery packet from the selected authorized access point to the rogue access point, wherein the rogue location discovery packet is logically addressed to a network device connected to the computer network; and
wherein the source address of the rogue location discovery packet is set to the logical network address of the selected wireless client; andmonitor for receipt of the rogue location discovery packet at the network device.
-
-
19. An apparatus comprising
a network interface, and a rogue containment module coupled to the network interface, wherein the rogue containment device is operative to: -
detect a rogue access point, determine the address of at least one rogue client associated with the rogue access point; and query, using the addresses of the at least one rogue client in the determining step, at least one network device for a port at which data units sourced from the at least one rogue client were encountered, wherein the at least one network device operative to switch or route data units between devices connected thereto, the data units including a source address and a destination address, wherein the at least one network device comprises at least two ports to which other devices connect, and wherein the at least one network device is operative to store the source addresses of the data units encountered at the ports of the at least one network device. - View Dependent Claims (20, 21, 22)
-
-
23. A method comprising:
-
detecting a rogue access point; transmitting by a central control element of a wireless network, one or more rogue location discovery packets through the rogue access point to an authorized host connected to a first network; and monitoring the first network for receipt of the one or more rogue location discovery packets to determine whether the rogue access point is connected to the first network. - View Dependent Claims (24, 25)
-
Specification