Claims
- 1. A method comprising the steps of:
monitoring access points through which data can be exchanged with a network, identifying an unauthorized access point, monitoring traffic passing through the identified unauthorized access point, and applying traffic filtering to monitored traffic passing through the identified unauthorized access point.
- 2. A method according to claim 1 wherein the step of monitoring comprises intermittently and periodically querying network nodes for recent entries into node identifying connectivity tables maintained at the nodes.
- 3. A method according to claim 2 wherein the step of monitoring comprises querying network nodes at predetermined regular intervals.
- 4. A method according to claim 2 wherein the step of monitoring comprises querying network nodes at random irregular intervals.
- 5. A method according to claim 1 wherein the step of applying traffic filtering comprises denying access to the network through the identified unauthorized access point.
- 6. A method according to claim 1 wherein the step of applying traffic filtering comprises directing traffic exchanged with the network through the identified unauthorized access point to a secure server.
- 7. A method comprising the steps of:
querying access points through which data can be exchanged with a network and gathering connectivity table information from a queried access point, reporting through the network to a server computer system the information gathered by querying, identifying an unauthorized access point by operation of the server system, and selectively applying a filter to the traffic exchanged with the network though the identified unauthorized access point.
- 8. Apparatus comprising:
a server computer system, a network interface connected to said system and providing a communication channel between said system and a network, an access point identification program stored accessibly to said system and cooperating therewith when executing to identify unauthorized nodes accessible through said interface, and a traffic filter controlling program stored accessibly to said system and cooperating therewith when executing to selectively impose a filter on traffic exchanged with the network through an unauthorized node.
- 9. Apparatus according to claim 8 wherein said traffic filter controlling program is effective to revise connectivity tables stored in the network and deny network access to an unauthorized node.
- 10. Apparatus according to claim 8 wherein said traffic filter controlling program is effective to reroute traffic exchanged with the network through the unauthorized node to a secure server.
- 11. A program product comprising:
a computer readable medium; and a program stored on said medium accessibly to a computer system, said program when executing on a system: monitoring access points through which data can be exchanged with a network, identifying an unauthorized access point, monitoring traffic passing through the identified unauthorized access point, and applying traffic filtering to monitored traffic passing through the identified unauthorized access point.
- 12. A program product comprising:
a computer readable medium; and a program stored on said medium accessibly to a computer system, said program when executing on a system: querying access points through which data can be exchanged with a network and gathering connectivity table information from a queried access point, reporting through the network to a server computer system the information gathered by querying, identifying an unauthorized access point by operation of the server system, and selectively applying a filter to the traffic exchanged with the network though the identified unauthorized access point.
RELATED APPLICATION
[0001] The invention here described is related to an invention described in co-pending application Ser. No. 10/107,794 filed Mar. 27, 2002 and assigned to common ownership with this application.