
AirMagnet Laptop Wireless LAN Policy Reference Guide
Chapter 4: Rogue AP and Station
97
Rogue Station
With the ubiquity of wireless devices (especially laptops with built-in
Wi-Fi cards), it is getting increasingly difficult to manage wireless
clients. Rogue stations may be intruders as well as legitimate
enterprise computers/laptops that are not authorized to utilize
wireless services. Unauthorized wireless stations failing to conform
to the stringent enterprise security policies risks exposing sensitive
and confidential information on their systems. For example, a
dangling unassociated station searching for a wireless AP used at the
employee's home risks a fake AP attack from intruders.
To ensure that only legitimate stations are present on your WLAN,
AirMagnet Enterprise uses the same rogue AP detection mechanism
to detect rogue stations. These detection mechanisms are by MAC
address, vendor ID, SSID, radio media type, and RF channels. In
addition, any station that is associated with a rogue AP also triggers a
rogue station alarm.
Rogue Station by Channel
AirMagnet Mobile alerts the WLAN administrator on rogue stations
by checking against enterprise standardized operating radio channels
for the 802.11a, 802.11b, or 802.11g standards. When a station
operating in a non-enterprise standardized radio channel is
discovered by AirMagnet Mobile, a rogue station alarm will be
generated.
Rogue stations installed by unauthorized employees may not follow
enterprise standard deployment procedures, and may thus
compromise security on the wireless and wired network. The
presence of rogue stations may also indicate malicious intruders
attempting to hack into the enterprise wired network. Rogue devices
discovered by AirMagnet Mobile should be thoroughly investigated.
Once a Rogue station is identified and reported by AirMagnet
Mobile
, the WLAN administrator may use the FIND tool to locate
the rogue device.
Laptop Wireless LAN Policy Reference Guide.book Page 97 Thursday, January 25, 2007 5:36 PM
Содержание PRG-Laptop 7.0
Страница 1: ...AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 8: ...vi Table of Contents AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 30: ...22 Chapter 1 Configuration Vulnerabilities AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 64: ...56 Chapter 2 IDS Denial of Service Attack AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 136: ...128 Chapter 5 Authentication and Encryption AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 138: ...130 Part Two Performance Intrusion AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 144: ...136 Chapter 6 Channel or Device Overload AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 192: ...184 Chapter 9 Problematic Traffic Pattern AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 210: ...196 Chapter 10 RF Management AirMagnet Laptop Wireless LAN Policy Reference Guide...