Security Problems with Allowing Wireless Routers

May 16, 2007
61
0
66
A question regarding my other thread which got closed

Most ICT departments frown on (and rightly so) on people adding wireless routers to their networks. It makes things really screwed up, from a network admin's standpoint at the least.

What are some of the problems that come with allowing wireless routers on networks? I understand the need for some kind of tracking and accountability, but can't one login, and association of all traffic to that IP, which would be the router's, be enough?

--------------------------
Our forums policy allows general discussion of issues like this one in general.

We are Not allowing posting specific instructions of how to Brake the Rules of other Networks that do not belong to you.

You can agree or disagree with the college policies but you can Not ask here for instructions of how to go around these rules.

If the thread will "slide" into explanations about the actual configuration of such system I would have to delete and close this thread too.

Thank you for your cooperation

-Jack
Moderator
 
Last edited by a moderator:

dawks

Diamond Member
Oct 9, 1999
5,071
2
81
They're worried that if you add a wireless access point, random people will jump on the network, potentially with infected computers, and spread their virus's inside the network. Which could cause a whole ton of pain for everyone. Or a malicious user could gain easy access and start snooping around.
Yes they would have tracking/accountability, but that would only serve to punish. Who cleans up the mess afterwards?

While I'm not a fan of the admins closing such a benign thread, I will warn you, good network admins will be able to detect you sharing your connection with other devices. This can be grounds for termination of service. I wouldn't be surprised if some schools would justify expulsion for such activities as well.
 
Last edited:

gsaldivar

Diamond Member
Apr 30, 2001
8,691
1
81
Unauthorized access to a company's networks and computer systems is a serious matter. I've seen individuals terminated and taken away in handcuffs for flouting a company's computing policy. Since the security of the entire network can be compromised with a single "weak link", it's the job of the systems admin to ensure that every device connected to that network is done so in a secure manner. Don't be the one who learns the hard way how far a company will go to protect access to its internal systems!
 

Ghiedo27

Senior member
Mar 9, 2011
403
0
0
I understand the need for some kind of tracking and accountability, but can't one login, and association of all traffic to that IP, which would be the router's, be enough?
That's kind of backwards. You don't install a security camera on your door before you buy a lock for it. The first measure is always to prevent bad things from happening in the first place or at least try to.

And yeah, messing with your employers business is a great way to get fired.
 

spidey07

No Lifer
Aug 4, 2000
65,469
5
76
Not only that but it interferes greatly with their wireless network, can cause bridging loops, become a rogue DHCP server, all kinds of bad things can happen whenever any NON-IS network equipment is put on their network. The security concerns mentioned are the greatest risk however and biggest reason why it's strictly forbidden at almost any company.

Also modern wireless networks have the ability to not only detect that wireless router immediately, but to locate it or actively attack it and also shut it's network port down.
 
Last edited:

unokitty

Diamond Member
Jan 5, 2012
3,346
1
0
May 16, 2007
61
0
66
I never meant for this thread to be another way to get information about how to obtain unauthorized access. I was honestly curious was to what was the reasoning behind decisions such as those, since in previous situations, the network was never set up like this before.
Thanks for the warnings everyone, and thanks for the link Uno, that was specifically what I was wondering about.
 
sale-70-410-exam    | Exam-200-125-pdf    | we-sale-70-410-exam    | hot-sale-70-410-exam    | Latest-exam-700-603-Dumps    | Dumps-98-363-exams-date    | Certs-200-125-date    | Dumps-300-075-exams-date    | hot-sale-book-C8010-726-book    | Hot-Sale-200-310-Exam    | Exam-Description-200-310-dumps?    | hot-sale-book-200-125-book    | Latest-Updated-300-209-Exam    | Dumps-210-260-exams-date    | Download-200-125-Exam-PDF    | Exam-Description-300-101-dumps    | Certs-300-101-date    | Hot-Sale-300-075-Exam    | Latest-exam-200-125-Dumps    | Exam-Description-200-125-dumps    | Latest-Updated-300-075-Exam    | hot-sale-book-210-260-book    | Dumps-200-901-exams-date    | Certs-200-901-date    | Latest-exam-1Z0-062-Dumps    | Hot-Sale-1Z0-062-Exam    | Certs-CSSLP-date    | 100%-Pass-70-383-Exams    | Latest-JN0-360-real-exam-questions    | 100%-Pass-4A0-100-Real-Exam-Questions    | Dumps-300-135-exams-date    | Passed-200-105-Tech-Exams    | Latest-Updated-200-310-Exam    | Download-300-070-Exam-PDF    | Hot-Sale-JN0-360-Exam    | 100%-Pass-JN0-360-Exams    | 100%-Pass-JN0-360-Real-Exam-Questions    | Dumps-JN0-360-exams-date    | Exam-Description-1Z0-876-dumps    | Latest-exam-1Z0-876-Dumps    | Dumps-HPE0-Y53-exams-date    | 2017-Latest-HPE0-Y53-Exam    | 100%-Pass-HPE0-Y53-Real-Exam-Questions    | Pass-4A0-100-Exam    | Latest-4A0-100-Questions    | Dumps-98-365-exams-date    | 2017-Latest-98-365-Exam    | 100%-Pass-VCS-254-Exams    | 2017-Latest-VCS-273-Exam    | Dumps-200-355-exams-date    | 2017-Latest-300-320-Exam    | Pass-300-101-Exam    | 100%-Pass-300-115-Exams    |
http://www.portvapes.co.uk/    | http://www.portvapes.co.uk/    |