
66
Chapter 3: IDS—Security Penetration
AirMagnet Laptop Wireless LAN Policy Reference Guide
Intruders with the legitimate 802.1x user identity and password
combination (or valid certificate) can penetrate the 802.1x
authentication process without the proper knowledge of the exact
EAP-type. The intruder will try different EAP-types such as TLS,
TTLS, LEAP, EAP-FAST, PEAP, etc. to successfully logon to the
network. This is on a trial and error basis, as there are only a handful
EAP-types for the intruder to try and somehow manage to get
authenticated to the network.
AirMagnet
Mobile
detects such an attempt by an intruder to gain
access to the network using different 802.1x authentication types.
Please take appropriate steps to locate the device and remove it from
the wireless environment. Use the FIND tool for this purpose.
Figure 3-6: The AirMagnet Mobile FIND tool locates devices by tracking
down the signal level.
Fake APs Detected
The Fake AP tool is meant to protect your WLAN by acting as a
decoy to confuse war-drivers using NetStumbler, Wellenreiter,
MiniStumbler, Kismet, etc. The tool generates beacon frames
emulating thousands of counterfeit 802.11b access points. War-
drivers encountering such large amount of APs will not be able to
Laptop Wireless LAN Policy Reference Guide.book Page 66 Thursday, January 25, 2007 5:36 PM
Summary of Contents for PRG-Laptop 7.0
Page 1: ...AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 8: ...vi Table of Contents AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 64: ...56 Chapter 2 IDS Denial of Service Attack AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 138: ...130 Part Two Performance Intrusion AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 144: ...136 Chapter 6 Channel or Device Overload AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 192: ...184 Chapter 9 Problematic Traffic Pattern AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 210: ...196 Chapter 10 RF Management AirMagnet Laptop Wireless LAN Policy Reference Guide...