WLANs Spur Security Questions
Q: What management tools can I use to detect rogue wireless LAN access points?
A: Vulnerability scanners, usually software products, can use ICMP (Internet Control Message Protocol)-Ping and other well-known network discovery technologies to identify access points. They typically do this by looking for open management ports or ports that at least respond with a signature that reveals the device type.
The link for this article located at eWeek is no longer available.