
AirMagnet Laptop Wireless LAN Policy Reference Guide
Chapter 3: IDS—Security Penetration
63
Figure 3-5: 802.11 APs location posted on the Internet by war-driving
groups
The second potential security threat for this alarm may be even more
damaging. Some of these alarms could be from legitimate and
authorized wireless clients on your WLAN that are attempting to
associate with any AP that they can talk to including your neighbor's
AP or the more damage causing rogue AP. This can be from a
Microsoft Windows XP laptop with an built-in Wi-Fi card or laptops
using wireless connectivity tools such as the Boingo™ client utility
and the WiNc™ client utility. Once associated, this client station can
be accessed by an intruder leading to a major security breach. To
make matters worse, the client station may even unknowingly bridge
the unintended AP with your company's wired LAN. A typical
scenario, for example, is that modern laptops today are equipped
with built-in Wi-Fi cards and are also at the same time physically
attached to your company wired LAN for network connectivity. If
the Windows bridging service is enabled on that Windows laptop,
your wired network is then open wirelessly. To be secure, all client
stations should be configured with specific SSID(s) to avoid
associating with an unintended AP. Mutual authentication such as
802.1x and various EAP methods should also be considered to tackle
such an issue.
Laptop Wireless LAN Policy Reference Guide.book Page 63 Thursday, January 25, 2007 5:36 PM
Содержание PRG-Laptop 7.0
Страница 1: ...AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 8: ...vi Table of Contents AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 30: ...22 Chapter 1 Configuration Vulnerabilities AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 64: ...56 Chapter 2 IDS Denial of Service Attack AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 136: ...128 Chapter 5 Authentication and Encryption AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 138: ...130 Part Two Performance Intrusion AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 144: ...136 Chapter 6 Channel or Device Overload AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 192: ...184 Chapter 9 Problematic Traffic Pattern AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 210: ...196 Chapter 10 RF Management AirMagnet Laptop Wireless LAN Policy Reference Guide...