
AirMagnet Laptop Wireless LAN Policy Reference Guide
Chapter 1: Configuration Vulnerabilities
3
Chapter 1:Configuration Vulnerabilities
Implementing a strong deployment policy is fundamental to
constructing a secure WLAN. However, enforcing the policy requires
constant monitoring to catch violations caused by mis-configuration
or equipment vendor implementation errors. With more and more
laptops coming packaged with built-in Wi-Fi capabilities, the
complexity of WLAN configuration extends beyond the Access
Points and to the stations. WLAN device configuration management
products can make the configuration process easier, but the need for
validation persists especially in laptops with built-in but unused and
unconfigured Wi-Fi. Besides checking policy validations, AirMagnet
also provides suggestions for best configuration practices in case a
suboptimal configuration choice is detected. For example,
AirMagnet Mobile generates a warning alarm when it detects an AP
broadcasting its SSID. The AirMagnet Mobile alarm description in
this case will recommend that the wireless administrator turn off the
SSID broadcast as a good security practice.
Ad-hoc Station Detected
A Wireless client station operating in ad-hoc mode (peer-to-peer
networking) is usually not protected by the same rigorous security
rules as enterprise-deployed APs in the infrastructure mode.
Figure 1-1: Ad-hoc Networking (Peer-to-Peer Stations) Bypasses
Enterprise Security Infrastructure
Peer-to-peer networking is usually not supported by the enterprise
WLAN, and thus lacks the necessary security measures such as
802.1x user authentication and the dynamic key encryption. As a
result, ad-hoc mode stations risk exposing data in the air through
weak (if any) encryption. In addition, weak authentication may
allow unauthorized devices to associate. If the ad-hoc mode client
station is also connected to the wired network, the entire enterprise
wired network is at risk. An Ad-hoc mode client station should be
investigated as a rogue AP because of the high risk imposed.
Laptop Wireless LAN Policy Reference Guide.book Page 3 Thursday, January 25, 2007 5:36 PM
Summary of Contents for PRG-Laptop 7.0
Page 1: ...AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 8: ...vi Table of Contents AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 64: ...56 Chapter 2 IDS Denial of Service Attack AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 138: ...130 Part Two Performance Intrusion AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 144: ...136 Chapter 6 Channel or Device Overload AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 192: ...184 Chapter 9 Problematic Traffic Pattern AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 210: ...196 Chapter 10 RF Management AirMagnet Laptop Wireless LAN Policy Reference Guide...