
AirMagnet Laptop Wireless LAN Policy Reference Guide
Chapter 3: IDS—Security Penetration
81
AirMagnet Mobile detects PSPF violations. That is, if a wireless client
attempts to communicate with another wireless client, AirMagnet
Mobile raises an alarm for a potential intrusion attack. This alarm
does not apply if your WLAN deploys wireless printers or VoWLAN
applications because these applications rely on wireless client-to-
client communication.
Soft AP or Host AP Detected
Host AP tools: Cqure AP
A host-based Access Point (desktop or a laptop computer serving as a
wireless access point) represents two potential threats to enterprise
security. Firstly, host-based APs are typically not part of the
enterprise wireless infrastructure and are likely to be rogue devices
that do not conform to the corporate security policy. Secondly, they
can be used by wireless attackers as a convenient platform to
implement various known intrusions, such as man-in-the-middle,
honey-pot AP, AP impersonation, denial-of-service attacks, etc. Since
software tools for turning a desktop or laptop into an AP can be
easily
downloaded from the Internet
, host-based APs are more than
just a theoretical threat. Furthermore, some laptops are shipped with
the HostAP software pre-loaded and activated. Once these laptops
connect to the enterprise wireless network, they expose the wireless
network to hackers.
Laptop Wireless LAN Policy Reference Guide.book Page 81 Thursday, January 25, 2007 5:36 PM
Содержание PRG-Laptop 7.0
Страница 1: ...AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 8: ...vi Table of Contents AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 30: ...22 Chapter 1 Configuration Vulnerabilities AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 64: ...56 Chapter 2 IDS Denial of Service Attack AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 136: ...128 Chapter 5 Authentication and Encryption AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 138: ...130 Part Two Performance Intrusion AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 144: ...136 Chapter 6 Channel or Device Overload AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 192: ...184 Chapter 9 Problematic Traffic Pattern AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 210: ...196 Chapter 10 RF Management AirMagnet Laptop Wireless LAN Policy Reference Guide...