
84
Chapter 3: IDS—Security Penetration
AirMagnet Laptop Wireless LAN Policy Reference Guide
For global AirMagnet Mobile deployment, the configurable office-
hour range is defined in local time. For the office and manufacturing
floor mixed WLAN, one can define office hours (for example, 9am to
5pm) for the office WLAN SSID and separate set of hours (for
example, 6am to 9pm) for the manufacturing floor WLAN SSID. If
this alarm is triggered, the administrator should look for devices
responsible for the suspicious traffic and take appropriate steps to
locate it and remove it from the wireless environment.
Unauthorized Association Detected
After configuring a list of MAC addresses of your authorized APs
and STAs, AirMagnet Enterprise can alert WLAN administrators on
an authorized (ACL client) STA whose MAC address falls within the
pre-configured address list associating to an unauthorized (rogue)
AP, whose MAC address does not fall within the pre-configured
address list. The authorized MAC address list can be imported to
AirMagnet Mobile from a file. It can also be auto-generated by
requesting AirMagnet Enterprise to accept all or a specific subset of
existing APs or STAs discovered by AirMagnet SmartEdge sensors.
Rogue APs installed by unauthorized employees usually do not
follow enterprise standard deployment practices and thus, may
compromise security on both the wireless and the wired
network. The Rogue AP may also allow malicious intruders to hack
into the enterprise wired network. One of the major concerns of most
wireless administrators face is unauthorized associations between an
ACL client and a rogue AP. The data to and from that ACL client now
flows through that AP and thus making sensitive corporate
information visible to the hacker. This makes not only the hacked
client vulnerable, but also affects the security of the entire wired
corporate network. AirMagnet Enterprise discovered rogue devices
should be investigated carefully.
Once a Rogue AP is identified and reported by AirMagnet Enterprise,
the WLAN administrator may use the triangulation feature (available
on the IDS/Rogue page) provided on the AirMagnet Enterprise
Console to locate the rogue device.
The triangulation feature can be used to locate the rogue device.
Along with locating the device, the WLAN administrator may use
one of the two AirMagnet Enterprise supported follow-up actions:
Laptop Wireless LAN Policy Reference Guide.book Page 84 Thursday, January 25, 2007 5:36 PM
Содержание PRG-Laptop 7.0
Страница 1: ...AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 8: ...vi Table of Contents AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 30: ...22 Chapter 1 Configuration Vulnerabilities AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 64: ...56 Chapter 2 IDS Denial of Service Attack AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 136: ...128 Chapter 5 Authentication and Encryption AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 138: ...130 Part Two Performance Intrusion AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 144: ...136 Chapter 6 Channel or Device Overload AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 192: ...184 Chapter 9 Problematic Traffic Pattern AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 210: ...196 Chapter 10 RF Management AirMagnet Laptop Wireless LAN Policy Reference Guide...