The most recent content from our members.
Providing access from nearly anywhere, Wireless Local Area Networks (WLANs) deliver a great deal of flexibility to business networks and their applications. It’s important to note that WLANs are also susceptible to vulnerabilities, misuse, and attacks from unauthorized devices known as rogue wireless devices. To safeguard…
Access control through whitelists can limit unwarranted users from gaining access to an organization’s network. But once it is found that users belong to the network, additional authorization determines what services they have access to. Even then, the possibility of a threat or a breach from a rogue within is something…
Suspicious devices on your network? How can you track them down? You basically have two options: the easy way (my personal favorite) or the hard way. Option 1: The Hard Way The hard way involves pings, traceroutes, and ARP tables before you can actually locate and disconnect the device/user. It can be a very frustrating…
Are you still crawling around your wiring closet trying to trace a rogue network device or user to a switch port? Regardless of whether your tracking users and devices in a wiring closet that looks like this… or like this.... the process can be tedious and maddening without the right tools. Almost all network admins and…
It looks like you're new here. Sign in or register to get started.