I've been noticing a Belkin router on my network for a while now and just yesterday another Linksys router as join the party, causing havoc on my connection speed!
The strange thing is that I'm the only one seeing them through Norton on my laptop, all other computer on my home network is not detecting them. could this mean that someone is monitoring me? is possible? If I move permanently to Ubuntu linux would the problem go away? OR will they still be able to connect and monitor me?
I have an underground cable connecting a classroom to the main server.
If I plug any computer directly into the underground cable it connects to the server fine.
If I plug a switch into the cable, none of the computers connected to the switch gets an IP address from the server. When I try to assign manual IP addresses I also can't connect.
But when I use the same switch and plug it into the server using a shorter cable everything works.
I set up a linksys e2500 router with name "mynetwork" and WPA2 password.
The network works fine, my laptop connects securely to it.
But when I View Available Wireless Networks , I see a second , unsecure network named "mynetwork-guest" to which my laptop will also connect with no credentials (not sure how that network got there).
How can I find and delete that unsecure network? When I go into my router setup, I only see mynetwork, not mynetwork-guest If it is of any use here is the IP information for both:
The settingd for mynetwork:
IP Address: 192.168.1.133 Subnet Mask: 255.255.255.0 Default Gateway: 192.168.1.1
The setting for mynetwork-guest:
IP Address: 192.168.33.137 Subnet Mask: 255.255.255.0 Default Gateway: 192.168.33.1
i am finding an ip address which is some hardware laptop or something that has got that ip from our doimain network while connected to our network. I dont know who it is and what it is and i always use Advanced Ip scanner and shut down any pcs manually with it and search for illegal hardwares connected to our lan but thisone is unable to be turned off it says unsuccessfull.Is there any software that allows me to kick out hardwares from our domain network?
Ive just updated my hardware including hard drves, and now I have a couple of redundant shared folders showing on the network trees (in my file manager) How do I delete these obsolete shared folders that dont exist?
How do I audit a network PC to see what it has on it or delete what does not need to be there. If I do it through the Windows add or remove they re-install. In the old days I could do it in DOS and then 'Tree' to list the properties and then delete what I wanted permanently.
i have a computer that is on my home network that i am trying to disable. the person no longer lives with us and it is still showing that there computer is connected to our WiFi ? our internet provider is At&t.
another computer is connected to my home network, and i want to remove them as i don't know who it is. I also notice my files have been very recently shared within the 'homegroup'. i have not personally done this.is someone accessing my computer?
I currently use Pure network majic as my network manager but on my desktop zoom network manager is installed and will not allow PN to do its job. I have gone through my desktop with a fine tooth comb to find this file/application to no avail. I don't remember installing it, bit I need to get it off.I have the same problem:The previous reply was Did you look for it inside the Control Panel under "Add/Remove Programs"? Is there anyway to get rid of it? Is there a process that is running when it is running and what is the name of the process?
"disconnect" home network from VPN tunnel to business location due to close of business. We had a business network that we could access from home. We've lost access to the business network, and it seems logical that we should be able to use the home network that is existing, but was fed internet from the office, and "re-direct " it to read just the home network.Currently at home we have a windows XP cmptr with a Netgear router, wireless access box, and Bell South Westell DSL box. How to we basically cut off the VPN link and just get what we have to read the home network?
My USB Belkin Wireless G Network Adapter seems to disconnect whenever I remove another USB device (usually a memory stick) from the PC.The problem started when I accidentally updated the driver via Windows. It didn't seem to work at all with this updated driver and I couldn't roll back or do a system restore to fix it. I'd done this before and ended up doing a complete re-install of Win 7. This time I did an upgrade install and the driver problem was cured.I'm running a HP XW8400 with Win 7 64 Pro which has been faultless for the 5 years I've had it.The only other change I've made recently is that I've stopped using a D-Link USB hub and started using the USB connectors on the HP LP2465 monitor.This only affects the wireless and no other USB devices.
When it disconnects, Win troubleshooting goes through the motions and reverts to LAN and doesn't see the wireless USB at all. This also happens if I don't use the troubleshooter.Device manager shows the driver to be working, but the wireless USB doesn't function even if I connect it directly to a USB port.The router is still working as all other devices in the house are connected.The only way around it seems to be a re-boot, but when this fault happens the PC gets stuck at "Shutting Down". Without the fault, re-boot or shut down works fine.When it happens I have to power off and on. This usually works fine but every now and then I notice the device driver for the Belkin is disabled.I've found a workaround in that I can take out the Belkin USB before removing another USB device. After the USB stick or whatever is removed if I then reconnect the wireless USB it reconnects fine.
We have several WLC's in school sites all connected back to a central WCS (ver6) which is working fine so I am just trying to clear up a few small issues.At a couple of sites I am getting alarms on WCS as per example below which has me at a loss.WCS has detected one or more alarms of category AP and severity Critical in Virtual Domain rootfor the following items:AP 'grafs-S03' is being contained. This is due to rogue device spoofing AP 'grafs-S03' BSSID or targetting AP 'grafs-S03' BSSID. - Controller Name: grafs-wlc-01E-mail will be suppressed up to 30 minutes for these alarms.Then a minute later I get the following to say its no longer being contained.WCS has detected a change in one or more alarms of category AP and severity Critical in Virtual Domain root. The new severity of the following items is Clear:AP 'grafs-S03' with protocol '802.11b/g' on Controller '10.96.192.5' is no longer being contained. Service is restored. - Controller Name: grafs-wlc-01E-mail will be suppressed up to 30 minutes for these changes.
I have a 5508 controller with 70 AP's ( a mix of 1131 and 1142). On the Monitor tab I can see under the Rogue Summary numerous "Rogue AP's" as well as the clients associated to these AP's. There are no Rogue AP's on my wired network according to the report. My question is this: What actions should I take regarding these "Roague AP's"? Many of them appear to be just other AP's in the residential area near by. I know I can take action to classify them as Friendly or Malicious as well as Internal or External, but what benefit is there to doing this? Will taking these actions keep my AP's from scanning off channel for Rogues? I read that if a "Rogue AP" is not on the wired network that is really is not considered a threat. Any Cisco best practices regarding how to handle detected Rogue AP's ?
We have recently deployed a wlc5508 & some 40+ 3502i APs at the location.In the wlc I notice quite a few "rogue AP" listed with ssid's.
Is there a way within the wcs or wlc to determine better if any of these rogue AP are on my Lan?If I can locate the mac address of the ethernet port on the rogue AP I can track the port down on the appropriate switch & shut it down.
If you deploy a Cisco 1242 a/b/g access point as a rogue detector, can this be used for 802.11n wired detection as well.i.e Will the controller send the MAC addresses of the 802.11n clients and APs. url...
I think this is a bug, but I wanted to check if others have the same problem. If we try to delete rogue AP's under MONITOR > Rogues with Remove Selected then we get a error message Authorization Failed. No sufficient privileges. At first sight, it looks like the AP's are gone, but if you click on the same menu again, they are still there.
My ACS admin user has role1=ALL. I even tried to set role1=MONITOR, then I don't get the message above, but it is stated that I can not delete known rogue AP's.
My computer was recently infected with the XP Antivirus 2012 rogue virus. I believe that it has been removed from my computer, but I am unable to connect to the internet. I am unable to obtain an IP address. The IP address is 00000 and the Submask is 0000. My operating system is Windows XP and I am using a High speed cable connection
I'm using a 2504 controller. I dont have WCS.My questions are about the best way to configure a Rogue Detector AP.
In my lab environment I setup the WLC with 2 APs. One AP was in local mode, and I put the other in Rogue Detector mode.The Rogue Detector AP was connected to a trunk port on my switch. But the AP needed to get its IP address from the DHCP server running on the WLC. So I set the native vlan of the trunk port to be the vlan on which the WLC management interface resides. If the trunk port was not configured with a native vlan, the AP couldn't get an address through DHCP, nor could the AP communicate with the WLC. This makes sense because untagged traffic on the trunk port will be delivered to the native vlan. So I take it that the AP doesn't know how to tag frames.Everything looked like it was working ok.
So I connected an autonomous AP (to be used as the rogue), and associated a wireless client to it. Sure enough it showed up on the WLC as a rogue AP, but it didn't say that it was connected on the wire. From the rogue client I was able to successfully ping the management interface of the WLC. But the WLC never actually reported the rogue AP as being connected to the wired network.So my questions are:
1. What is the correct configuration for the trunk port? Should it not be configured with a native vlan? If not, then I'm assuming the rogue detector AP will have to have a static IP address defined, and it would have to be told which vlan it's supposed to use to communicate with the WLC.
2. Assuming there is a rogue client associated with the rogue AP, how long should it reasonably take before it is determined that the rogue AP is connected to the wired network? I know this depends on if the rogue client is actually generating traffic, but in my lab environment I had the rogue client pinging the management interface of the WLC and still wasn't being picked up as an on-the-wire rogue.
I'm building the use case to test / detect for rogue devices on the network. I have in my enviroment Lan controller 5500 controller with AP (aironet 3500). I want to detect for rogue devices/ap connected to my network. I know before i can see this activity on the network i have to configure the controller / ap to detect this behavior. I'm doing this step.
Authorize AP's against AAA function to make sure that all the AP's registering to your WLC are authorized AP's of the network.By enabling this feature, only those AP's whose mac-addresses are present in the authorization list, will be able to register to the URL
Using Rogue detection. feature, the WLC will be able to detect any AP that is not a part of its RF group and contain it.URL
NOTE: from the forum I have seen other talks about the same issue and saying that if I have any APs in "Rogue Detection" mode sitting on the trunk port on the switch then only, this AP will detect the Rogue on Wired
I don't think i completely understand this statement, by sitting does it mean that it is passively sniffing coming in/out on trunk link?
Considering the above steps are accurate, after this will i be able to see rogue detection behavior in syslogs? What exactly would be the messages that would produce this behavior.
I'm building the use case to test / detect for rogue devices on the network. I have in my enviroment Lan controller 5500 controller with AP (aironet 3500). I want to detect for rogue devices/ap connected to my network. I know before i can see this activity on the network i have to configure the controller / ap to detect this behavior.
Authorize AP's against AAA function to make sure that all the AP's registering to your WLC are authorized AP's of the network.By enabling this feature, only those AP's whose mac-addresses are present in the authorization list, will be able to register to the WLC. url...
Using Rogue detection. feature, the WLC will be able to detect any AP that is not a part of its RF group and contain it. url...the forum I have seen other talks about the same issue and saying that if I have any APs in "Rogue Detection" mode sitting on the trunk port on the switch then only, this AP will detect the Rogue on Wired.
(5508 WLC, 1142N APs).I understand if I enable the AP mode to Rogue Detector from the details page of the AP, the AP stops accepting requests and is now looking for rogue items on the wired network. Is this the same when I enable Rogue Location Discovery Protocol? Will I lose the wireless functionality of all of my APs on the controller?
Next question, when I look at the Rogue Summary on the Monitoring page I see three Adhoc Rogue devices. When I select the Detail link only one shows. I remember the other two were HP mutifuction devices with WIFI enabled but I cannot retrieve that information anymore.
I have the wireless controller 5508 and many AP1261 registered on site. It detects a lot of rogue access points around. I would like to find out geographic location of these rogue access points. Is it possible?