Ziff Davis Media Inc.'s Feb. 26 eSeminar, "How to Lock Down Wireless LANs," was testament to the interest in and questions about WLANs in the enterprise. The seminar broke registration and attendance records, and attendee questions came in faster than seminar . . .
Ziff Davis Media Inc.'s Feb. 26 eSeminar, "How to Lock Down Wireless LANs," was testament to the interest in and questions about WLANs in the enterprise. The seminar broke registration and attendance records, and attendee questions came in faster than seminar presenters could answer them. Here, then, are answers to some of the most frequently asked questions. For an archived version of the event and more information about eSeminars, go to https://webseminarslive.com/.

Q: What management tools can I use to detect rogue wireless LAN access points?

A: Vulnerability scanners, usually software products, can use ICMP (Internet Control Message Protocol)-Ping and other well-known network discovery technologies to identify access points. They typically do this by looking for open management ports or ports that at least respond with a signature that reveals the device type.

The link for this article located at eWeek is no longer available.