Methods to Detect Access Points
There are several methods to detect rogue access points. Network Administrators should first develop policies on the detection of these access points. Administrators can use the simplest form of detection by monitoring the signals at the location, or use wireless probes.
Many access point vendors today have built in functionality that allows the access point to detect other access points on the network. Network administrators can program the APs to recognize the 'friendly' access points. The AP can in turn report to the IT team if a rogue access point is placed on the network.
Desktops placed throughout an organization with USB or PCI wireless cards can be set up to detect and monitor access points on the network. Other methods include having the Network Administrators place a dedicated access point(s) on the network and have this AP listen continuously for rogue access points.
Many companies today are electing to use software that manages WLANs (Wireless Local Area Networks). This software can be configured by network administrators so that each friendly access point is identified and rogue access points will be reported. In the event a rogue access point is placed on the network, the access point is compared to the software suite's database and a report is sent to the information technology department.
Companies such as AirWave and AdventNet sell suites that manage networks and track, inventory and report on wireless connectivity in an organization.
Regardless of the method companies use, they need to be aware of how to detect these threats on their network.