Iam interested see what practices you take against war driving on cisco WLAN devices. Not looking for answear as to what can be done to prevent unauthorized use of your AP, but what can be done to stop its detection with popular war driving tools.
Will dissabling "Guest Access" SSID be enough to stop the broadcasting beacons popular scanners like Netstumbler is looking for in order to make a match? Or will it still be detected.
Hi, I am just curious, what threat do you consider war-driving presents?
As long as you network is secured, what harm is there in allowing it to be detected?
Allowing the network to be detected
-- enables authorized users easily find it
-- allows neighbouring installations to detect and avoid using the same channels in adajacent APs
-- ensures 802.11 standards compliance
Having said that, it is fairly easy to turn off broadcast SSID, and that will prevent most casual wardrivers from seeing it. However any determined hacker can easily detect WLAN traffic, and then sniff for a probe-request/response in which the SSID is transmitted in the clear. there is currently no way to hide the SSID from from probe-request/responses.