SlideShare une entreprise Scribd logo
1  sur  21
Télécharger pour lire hors ligne
All You Wanted to Know About
WiFi Rogue Access Points
Gopinath K. N. Hemant Chaskar
AirTight Networks
www.AirTightNetworks.com
A quick reference to Rogue AP security
threat, Rogue AP detection and mitigation
© 2009, AirTight Networks Inc. All Rights Reserved.
What is Rogue AP
Unmanaged (unauthorized) AP attached to enterprise
wired network
© 2009, AirTight Networks Inc. All Rights Reserved.
How does Rogue AP pop up on enterprise network
Malicious intent or simply unwitting, impatient employee
Commoditization of WiFi APs raises the risk of someone
putting up personal AP on the enterprise network
It has been estimated that almost 20% of corporations
have Rogue APs in their networks at some time
Pocket APWall Jack AP
PCMCIA and USB APs
Wireless Router
© 2009, AirTight Networks Inc. All Rights Reserved.
Why is Rogue AP such a bad thing
Rogue AP on network =
(logically) LAN jack of
your network hanging
out of the premises
RF signal spillage of
Rogue AP provides
access to wired
enterprise network from
outside of the premises
© 2009, AirTight Networks Inc. All Rights Reserved.
Attacks on wired network infrastructure
• ARP poisoning, DHCP attacks, STP attacks, DoS attacks etc.
Mapping the network for targeted attacks
Scanning hosts on network for targeted attacks
MIM (Man-In-Middle) and data sniffing on wired network
See this blog article for details on attacks through Rogue
AP http://blog.airtightnetworks.com/wifi-rogue-ap-5-ways-
to-%e2%80%9cuse%e2%80%9d-it/
So, how can you protect enterprise
network from Rogue APs?
What are some specific attacks which can be
launched through Rogue AP
© 2009, AirTight Networks Inc. All Rights Reserved.
Can the firewall protect from Rogue AP
No!
Firewall works at traffic transfer point between LAN & Internet
Firewall does not detect Rogue AP
Firewall does not see traffic through Rogue AP
Internet Firewall
Office Premises
and LAN
Rogue AP
Attacker
© 2009, AirTight Networks Inc. All Rights Reserved.
Can WPA2 protect from Rogue APs
No!
You can enforce security controls such as WPA2 only on
APs which you manage, i.e., your Authorized APs
Rogue AP is not your managed AP
In fact, most Rogue APs found in the field installed by
naïve users either have
• OPEN wireless link (out of box default) or
• WEP wireless link (deterministically crackable)
© 2009, AirTight Networks Inc. All Rights Reserved.
Is 802.1X port control sufficient to protect
from Rogue AP
As a matter of fact, most networks do not have 802.1x
port control today
If even if 802.1x is deployed, it cannot protect from all
Rogue AP configurations, some examples below:
Rogue APs over bridging laptops MAC spoofer
Legitimate
user
Rogue AP
802.1X
© 2009, AirTight Networks Inc. All Rights Reserved.
Can antivirus, wired IDS protect from Rogue AP
No!
Rogue AP threats operates at a layer below antivirus and
wired IDS protection
© 2009, AirTight Networks Inc. All Rights Reserved.
Is NAC sufficient to protect from Rogue AP
As a matter of fact, most networks do not have NAC
deployed today
If even if NAC is deployed, it cannot protect from all
Rogue AP configurations, some examples below:
Rogue APs over bridging laptops
MAC spoofer
Legitimate
user
Rogue AP
NAC
© 2009, AirTight Networks Inc. All Rights Reserved.
So what protects network from Rogue APs
Sensor based wireless intrusion
prevention system (WIPS) which
• Watches for Rogue APs 24x7
• Performs wired/wireless correlation
for AP network connectivity testing
to detect Rogue AP
• Provides for automatic blocking of
Rogue AP
• Locates Rogue AP for easy
searching and removal from the
network
© 2009, AirTight Networks Inc. All Rights Reserved.
WIPS in action - Rogue AP protection
See demonstration video at
http://www.airtightnetworks.com/fileadmin/content_images/
demos/RogueAP-Demo/RogueAP-Demo.html
© 2009, AirTight Networks Inc. All Rights Reserved.
What are different types of Rogue APs
Various permutations and combinations of
• Bridging APs (on subnets coinciding with or different
from wired interface address)
• Router (NAT) APs (with and without MAC cloning)
• APs with encrypted wireless links
• APs with open wireless links
• Soft APs (natively configured on wireless client or which
use external devices such as USB sticks)
• APs on different VLANs in the LAN including no-WiFi
subnets
© 2009, AirTight Networks Inc. All Rights Reserved.
Can wire side only scanning protect from all Rogue AP
No!
Several Rogue AP types are undetectable by wire side only
scanning, examples:
• Bridging APs on a subnet inconsistent with their wired IP
address (default configuration)
• Soft APs
• Router (NAT) APs with cloned wire side MAC address
See http://blog.airtightnetworks.com/rogue-ap-detection-
pci-compliance/ for more details
© 2009, AirTight Networks Inc. All Rights Reserved.
What does AP auto-classification mean in the context
of Rogue AP
All APs visible in air
Managed APs
(Static Part)
Unmanaged APs
(Dynamic Part)
Not connected
to my network
Connected to
my network
Authorized
AP
External
AP
Rogue
AP
Automatically classifying APs visible in airspace into three
categories: Authorized, External and Rogue
© 2009, AirTight Networks Inc. All Rights Reserved.
What is key technology enabler for accurate auto-
classification
Robust testing of AP’s connectivity to monitored enterprise
network is the key technology enabler
If AP is not detected as connected, when it is indeed
connected to the monitored enterprise network, it results in
security hole (false negative)
If AP is detected as connected, when it is indeed not
connected to the monitored enterprise network, it results in
false alarm (false positive)
© 2009, AirTight Networks Inc. All Rights Reserved.
What are prevalent AP connectivity testing methods
MAC Correlation (CAM
table lookup)
•Collect all MAC addresses
seen on wired network
(CAM table lookup)
•Detect all MAC addresses
seen on wireless network
•Presume network
connectivity of APs based
on match between wired
and wireless MAC
addresses
Signature Packet Injection
• Inject signatures packets
in the wired and wireless
network
• Detect which APs forward
signature packets
between wired and
wireless interfaces
• Confirm network
connectivity of APs based
on signature packet
forwarding
© 2009, AirTight Networks Inc. All Rights Reserved.
How do these connectivity testing methods compare
Packet injection method is superior to CAM table lookup as
it is fast, accurate, gracefully scalable to large networks
and capable of detecting all types of Rogue APs
For more details on this comparison and auto-classification
methods used in various WIPS in the market, see
http://blog.airtightnetworks.com/ugly-bad-and-good-of-
wireless-rogue-access-point-detection/
http://blog.airtightnetworks.com/making-the-right-choice-
for-rogue-access-point-detection-technology/
© 2009, AirTight Networks Inc. All Rights Reserved.
How does WIPS block Rogue AP
Over the air quarantine
• WIPS sensor blocks client’s
connection to Rogue AP by
transmitting spoofed
disconnection frames
• Deauthentication is popularly
used disconnection frame
Switch port disable
• WIPS attempts to locate switch
port into which Rogue AP is
connected
• If found, disables the switch
port using SNMP
Rogue AP
WIPS Sensor
© 2009, AirTight Networks Inc. All Rights Reserved.
How do the two Rogue AP blocking methods
compare
Over the air quarantine
• Works independent of
correlation between wired
and wireless addresses of
Rogue AP
• Non-intrusive with network
infrastructure
• No interoperability problems
with different switch vendors
• Deauthentication based over
the air quarantine will not
work with .11w Rogue APs
Switch port disable
• Only works for those Rogue
APs which have correlation
between wired and wireless
addresses
• Highly intrusive. WIPS needs
need to know “set” password
on switches. Error in tracing
leaf switch may turn off entire
switch branch
• Suffers from switch vendor
interoperability problems
© 2009, AirTight Networks Inc. All Rights Reserved.
Conclusion
Rogue AP is unmanaged AP plugged into wired enterprise
network by unwilling or malicious employees or visitors
Rogue AP can expose wired enterprise network to
outsiders over its RF signal spillage
Rogue AP threat is not mitigated by firewalls, WPA2,
802.1x, NAC, anti-virus or wire side scanners
Sensor based wireless intrusion prevention system (WIPS)
detects, blocks and locates Rogue APs
Testing of AP’s connectivity to monitored enterprise
network is key technology enabler for reliable protection
from Rogue APs

Contenu connexe

Tendances

Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phonesDefcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phonesPriyanka Aash
 
Ayulgui baidliin buteegdehunud Checkpoint Worldwide #1 Security products
Ayulgui baidliin buteegdehunud Checkpoint Worldwide #1 Security productsAyulgui baidliin buteegdehunud Checkpoint Worldwide #1 Security products
Ayulgui baidliin buteegdehunud Checkpoint Worldwide #1 Security productsVertexMon VertexMon
 
OWASP Cambridge Chapter Meeting 13/12/2016
OWASP Cambridge Chapter Meeting 13/12/2016OWASP Cambridge Chapter Meeting 13/12/2016
OWASP Cambridge Chapter Meeting 13/12/2016joebursell
 
Nec exp ether071719
Nec exp ether071719Nec exp ether071719
Nec exp ether071719Yutaka Kawai
 
Web Application Frewall
Web Application FrewallWeb Application Frewall
Web Application FrewallAbhishek Singh
 
wi-fi technology
wi-fi technologywi-fi technology
wi-fi technologytardeep
 
Sasa milic, cisco advanced malware protection
Sasa milic, cisco advanced malware protectionSasa milic, cisco advanced malware protection
Sasa milic, cisco advanced malware protectionDejan Jeremic
 
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)Introduction to Mobile Application Security - Techcity 2015 (Vilnius)
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)Luca Bongiorni
 
Cisco ASA Firepower
Cisco ASA FirepowerCisco ASA Firepower
Cisco ASA FirepowerAnwesh Dixit
 
10 voipmistakes
10 voipmistakes10 voipmistakes
10 voipmistakesTim Panton
 
wi-fi technology
wi-fi technologywi-fi technology
wi-fi technologyAkhil Kumar
 
Presentación - Cisco ASA with FirePOWER Services
Presentación -  Cisco ASA with FirePOWER ServicesPresentación -  Cisco ASA with FirePOWER Services
Presentación - Cisco ASA with FirePOWER ServicesOscar Romano
 
Wlan networking and security
Wlan networking and securityWlan networking and security
Wlan networking and securityakki_hearts
 

Tendances (20)

wifi himanshu
wifi himanshuwifi himanshu
wifi himanshu
 
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phonesDefcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
 
Wi fi
Wi fiWi fi
Wi fi
 
Ayulgui baidliin buteegdehunud Checkpoint Worldwide #1 Security products
Ayulgui baidliin buteegdehunud Checkpoint Worldwide #1 Security productsAyulgui baidliin buteegdehunud Checkpoint Worldwide #1 Security products
Ayulgui baidliin buteegdehunud Checkpoint Worldwide #1 Security products
 
WAFEC
WAFECWAFEC
WAFEC
 
OWASP Cambridge Chapter Meeting 13/12/2016
OWASP Cambridge Chapter Meeting 13/12/2016OWASP Cambridge Chapter Meeting 13/12/2016
OWASP Cambridge Chapter Meeting 13/12/2016
 
Nec exp ether071719
Nec exp ether071719Nec exp ether071719
Nec exp ether071719
 
Web Application Frewall
Web Application FrewallWeb Application Frewall
Web Application Frewall
 
wi-fi technology
wi-fi technologywi-fi technology
wi-fi technology
 
Industry breakout focus on education eduroam_anyroam_andy logan
Industry breakout focus on education eduroam_anyroam_andy loganIndustry breakout focus on education eduroam_anyroam_andy logan
Industry breakout focus on education eduroam_anyroam_andy logan
 
Wi fi
Wi fiWi fi
Wi fi
 
Sasa milic, cisco advanced malware protection
Sasa milic, cisco advanced malware protectionSasa milic, cisco advanced malware protection
Sasa milic, cisco advanced malware protection
 
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)Introduction to Mobile Application Security - Techcity 2015 (Vilnius)
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)
 
Nicholaus ufoakses
Nicholaus ufoaksesNicholaus ufoakses
Nicholaus ufoakses
 
Cisco ASA Firepower
Cisco ASA FirepowerCisco ASA Firepower
Cisco ASA Firepower
 
10 voipmistakes
10 voipmistakes10 voipmistakes
10 voipmistakes
 
wi-fi technology
wi-fi technologywi-fi technology
wi-fi technology
 
Presentación - Cisco ASA with FirePOWER Services
Presentación -  Cisco ASA with FirePOWER ServicesPresentación -  Cisco ASA with FirePOWER Services
Presentación - Cisco ASA with FirePOWER Services
 
Wlan networking and security
Wlan networking and securityWlan networking and security
Wlan networking and security
 
WIFI[autosaved]
WIFI[autosaved]WIFI[autosaved]
WIFI[autosaved]
 

Similaire à FAQ - Rogue AP - What is Rogue Access Point?

Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesMichael Boman
 
AirTight Networks WIPS at Wireless Field Day 6 WFD6
AirTight Networks WIPS at Wireless Field Day 6 WFD6AirTight Networks WIPS at Wireless Field Day 6 WFD6
AirTight Networks WIPS at Wireless Field Day 6 WFD6AirTight Networks
 
Wi fi security dedicated architectures
Wi fi security dedicated architecturesWi fi security dedicated architectures
Wi fi security dedicated architecturesparipec
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and Solutionshemantchaskar
 
Wireside Only Rogue Access Point Detection
Wireside Only Rogue Access Point DetectionWireside Only Rogue Access Point Detection
Wireside Only Rogue Access Point Detectionbanchar
 
Conquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the EnterpriseConquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the EnterpriseAirTight Networks
 
Top 5 wi fi security threats
Top 5 wi fi security threatsTop 5 wi fi security threats
Top 5 wi fi security threatsgruzabb
 
How to Hack a Telecom and Stay Alive
How to Hack a Telecom and Stay AliveHow to Hack a Telecom and Stay Alive
How to Hack a Telecom and Stay AlivePositive Hack Days
 
Air Tight Airport Wi Fi Scan Analysis
Air Tight Airport Wi Fi Scan AnalysisAir Tight Airport Wi Fi Scan Analysis
Air Tight Airport Wi Fi Scan AnalysisAirTight Networks
 
Wireless Pentesting: It's more than cracking WEP
Wireless Pentesting: It's  more than cracking WEPWireless Pentesting: It's  more than cracking WEP
Wireless Pentesting: It's more than cracking WEPJoe McCray
 
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...Chrysostomos Christofi
 

Similaire à FAQ - Rogue AP - What is Rogue Access Point? (20)

2012 ah vegas wlan security fundamentals
2012 ah vegas   wlan security fundamentals2012 ah vegas   wlan security fundamentals
2012 ah vegas wlan security fundamentals
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
AirTight Networks - Wireless Security 2011
AirTight Networks - Wireless Security 2011AirTight Networks - Wireless Security 2011
AirTight Networks - Wireless Security 2011
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best Practices
 
AirTight Networks WIPS at Wireless Field Day 6 WFD6
AirTight Networks WIPS at Wireless Field Day 6 WFD6AirTight Networks WIPS at Wireless Field Day 6 WFD6
AirTight Networks WIPS at Wireless Field Day 6 WFD6
 
Wi fi security dedicated architectures
Wi fi security dedicated architecturesWi fi security dedicated architectures
Wi fi security dedicated architectures
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and Solutions
 
Wireside Only Rogue Access Point Detection
Wireside Only Rogue Access Point DetectionWireside Only Rogue Access Point Detection
Wireside Only Rogue Access Point Detection
 
Conquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the EnterpriseConquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the Enterprise
 
Airheads barcelona 2010 securing wireless la ns
Airheads barcelona 2010   securing wireless la nsAirheads barcelona 2010   securing wireless la ns
Airheads barcelona 2010 securing wireless la ns
 
Wireless security
Wireless securityWireless security
Wireless security
 
Wlan security
Wlan securityWlan security
Wlan security
 
Airheads dallas 2011 wireless security
Airheads dallas 2011   wireless securityAirheads dallas 2011   wireless security
Airheads dallas 2011 wireless security
 
Top 5 wi fi security threats
Top 5 wi fi security threatsTop 5 wi fi security threats
Top 5 wi fi security threats
 
How to Hack a Telecom and Stay Alive
How to Hack a Telecom and Stay AliveHow to Hack a Telecom and Stay Alive
How to Hack a Telecom and Stay Alive
 
Air Tight Airport Wi Fi Scan Analysis
Air Tight Airport Wi Fi Scan AnalysisAir Tight Airport Wi Fi Scan Analysis
Air Tight Airport Wi Fi Scan Analysis
 
Firewall
FirewallFirewall
Firewall
 
Wireless Pentesting: It's more than cracking WEP
Wireless Pentesting: It's  more than cracking WEPWireless Pentesting: It's  more than cracking WEP
Wireless Pentesting: It's more than cracking WEP
 
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
 
Gateway
GatewayGateway
Gateway
 

Plus de Tũi Wichets

อัตรา Rain Rate ในแถบ East-Asia
อัตรา Rain Rate ในแถบ East-Asia อัตรา Rain Rate ในแถบ East-Asia
อัตรา Rain Rate ในแถบ East-Asia Tũi Wichets
 
ขั้นตอนการปรับตำแหน่งจาน Mikrotik mANT 30dBi 5Ghz MIMO ให้ feed สัญญาณ Slant ...
ขั้นตอนการปรับตำแหน่งจาน Mikrotik mANT 30dBi 5Ghz MIMO ให้ feed สัญญาณ Slant ...ขั้นตอนการปรับตำแหน่งจาน Mikrotik mANT 30dBi 5Ghz MIMO ให้ feed สัญญาณ Slant ...
ขั้นตอนการปรับตำแหน่งจาน Mikrotik mANT 30dBi 5Ghz MIMO ให้ feed สัญญาณ Slant ...Tũi Wichets
 
การคอนฟิกส์ OSPF บน Ubiquiti Edge Router
การคอนฟิกส์ OSPF บน Ubiquiti Edge Routerการคอนฟิกส์ OSPF บน Ubiquiti Edge Router
การคอนฟิกส์ OSPF บน Ubiquiti Edge RouterTũi Wichets
 
MTCNA Training outline, Certified Network Associate (MTCNA)
MTCNA Training outline, Certified Network Associate (MTCNA)MTCNA Training outline, Certified Network Associate (MTCNA)
MTCNA Training outline, Certified Network Associate (MTCNA)Tũi Wichets
 
MTCWE Training outline, Course prerequisites – MTCNA certificate
MTCWE Training outline, Course prerequisites – MTCNA certificateMTCWE Training outline, Course prerequisites – MTCNA certificate
MTCWE Training outline, Course prerequisites – MTCNA certificateTũi Wichets
 
MTCRE Training outline, Course prerequisites – MTCNA certificate
MTCRE Training outline, Course prerequisites – MTCNA certificateMTCRE Training outline, Course prerequisites – MTCNA certificate
MTCRE Training outline, Course prerequisites – MTCNA certificateTũi Wichets
 
MTCINE training outline, Course prerequisites – MTCNA and MTCRE certificates
MTCINE training outline, Course prerequisites – MTCNA and MTCRE certificatesMTCINE training outline, Course prerequisites – MTCNA and MTCRE certificates
MTCINE training outline, Course prerequisites – MTCNA and MTCRE certificatesTũi Wichets
 
บล๊อกเวปไซท์ บน Open WRT หรือ บน Ubiquiti NanoStation M5 หรือ บน airOS
บล๊อกเวปไซท์ บน Open WRT หรือ บน  Ubiquiti NanoStation M5 หรือ บน airOSบล๊อกเวปไซท์ บน Open WRT หรือ บน  Ubiquiti NanoStation M5 หรือ บน airOS
บล๊อกเวปไซท์ บน Open WRT หรือ บน Ubiquiti NanoStation M5 หรือ บน airOSTũi Wichets
 
Introduction to Data Centre 3.0
Introduction to Data Centre 3.0Introduction to Data Centre 3.0
Introduction to Data Centre 3.0Tũi Wichets
 
Windows Server 2012 R2 products & editions comparison
Windows Server 2012 R2 products & editions comparisonWindows Server 2012 R2 products & editions comparison
Windows Server 2012 R2 products & editions comparisonTũi Wichets
 
Settings MikroTik Router and Access Point to schedule AP radio on off via script
Settings MikroTik Router and Access Point to schedule AP radio on off via scriptSettings MikroTik Router and Access Point to schedule AP radio on off via script
Settings MikroTik Router and Access Point to schedule AP radio on off via scriptTũi Wichets
 
แนะนำแนวทางการออกแบบ การปรับแต่ง การรับส่งสัญญาณ airFiber 24 - airFiber Desig...
แนะนำแนวทางการออกแบบ การปรับแต่ง การรับส่งสัญญาณ airFiber 24 - airFiber Desig...แนะนำแนวทางการออกแบบ การปรับแต่ง การรับส่งสัญญาณ airFiber 24 - airFiber Desig...
แนะนำแนวทางการออกแบบ การปรับแต่ง การรับส่งสัญญาณ airFiber 24 - airFiber Desig...Tũi Wichets
 
How to link public addresses (real ip) to private ip or lan ip
How to link public addresses (real ip) to private ip or lan ipHow to link public addresses (real ip) to private ip or lan ip
How to link public addresses (real ip) to private ip or lan ipTũi Wichets
 
เอกสาร แนวทาง การอินติเกรท Mac OS X เข้ากับ ระบบ Active Directory อย่างไร Bes...
เอกสาร แนวทาง การอินติเกรท Mac OS X เข้ากับ ระบบ Active Directory อย่างไร Bes...เอกสาร แนวทาง การอินติเกรท Mac OS X เข้ากับ ระบบ Active Directory อย่างไร Bes...
เอกสาร แนวทาง การอินติเกรท Mac OS X เข้ากับ ระบบ Active Directory อย่างไร Bes...Tũi Wichets
 
Windows server 2012 r2 Hyper-v Component architecture
Windows server 2012 r2 Hyper-v Component architecture Windows server 2012 r2 Hyper-v Component architecture
Windows server 2012 r2 Hyper-v Component architecture Tũi Wichets
 
Gigabit Wi-Fi 802.11AC In Depth
Gigabit Wi-Fi 802.11AC In DepthGigabit Wi-Fi 802.11AC In Depth
Gigabit Wi-Fi 802.11AC In DepthTũi Wichets
 
ค่า Tx Power Mode ใน Ubiquiti และ Mikrotik (RF Tx Power Mode Settings)
ค่า Tx Power Mode ใน Ubiquiti และ Mikrotik (RF Tx Power Mode Settings)ค่า Tx Power Mode ใน Ubiquiti และ Mikrotik (RF Tx Power Mode Settings)
ค่า Tx Power Mode ใน Ubiquiti และ Mikrotik (RF Tx Power Mode Settings)Tũi Wichets
 
SwOS (MikroTik Switch OS) Administration Guide
SwOS (MikroTik Switch OS) Administration GuideSwOS (MikroTik Switch OS) Administration Guide
SwOS (MikroTik Switch OS) Administration GuideTũi Wichets
 
คู่มือเริ่มต้นใช้งานด่วน สำหรับ Excel 2013
คู่มือเริ่มต้นใช้งานด่วน สำหรับ Excel 2013คู่มือเริ่มต้นใช้งานด่วน สำหรับ Excel 2013
คู่มือเริ่มต้นใช้งานด่วน สำหรับ Excel 2013Tũi Wichets
 

Plus de Tũi Wichets (20)

RouterOS Commands
RouterOS CommandsRouterOS Commands
RouterOS Commands
 
อัตรา Rain Rate ในแถบ East-Asia
อัตรา Rain Rate ในแถบ East-Asia อัตรา Rain Rate ในแถบ East-Asia
อัตรา Rain Rate ในแถบ East-Asia
 
ขั้นตอนการปรับตำแหน่งจาน Mikrotik mANT 30dBi 5Ghz MIMO ให้ feed สัญญาณ Slant ...
ขั้นตอนการปรับตำแหน่งจาน Mikrotik mANT 30dBi 5Ghz MIMO ให้ feed สัญญาณ Slant ...ขั้นตอนการปรับตำแหน่งจาน Mikrotik mANT 30dBi 5Ghz MIMO ให้ feed สัญญาณ Slant ...
ขั้นตอนการปรับตำแหน่งจาน Mikrotik mANT 30dBi 5Ghz MIMO ให้ feed สัญญาณ Slant ...
 
การคอนฟิกส์ OSPF บน Ubiquiti Edge Router
การคอนฟิกส์ OSPF บน Ubiquiti Edge Routerการคอนฟิกส์ OSPF บน Ubiquiti Edge Router
การคอนฟิกส์ OSPF บน Ubiquiti Edge Router
 
MTCNA Training outline, Certified Network Associate (MTCNA)
MTCNA Training outline, Certified Network Associate (MTCNA)MTCNA Training outline, Certified Network Associate (MTCNA)
MTCNA Training outline, Certified Network Associate (MTCNA)
 
MTCWE Training outline, Course prerequisites – MTCNA certificate
MTCWE Training outline, Course prerequisites – MTCNA certificateMTCWE Training outline, Course prerequisites – MTCNA certificate
MTCWE Training outline, Course prerequisites – MTCNA certificate
 
MTCRE Training outline, Course prerequisites – MTCNA certificate
MTCRE Training outline, Course prerequisites – MTCNA certificateMTCRE Training outline, Course prerequisites – MTCNA certificate
MTCRE Training outline, Course prerequisites – MTCNA certificate
 
MTCINE training outline, Course prerequisites – MTCNA and MTCRE certificates
MTCINE training outline, Course prerequisites – MTCNA and MTCRE certificatesMTCINE training outline, Course prerequisites – MTCNA and MTCRE certificates
MTCINE training outline, Course prerequisites – MTCNA and MTCRE certificates
 
บล๊อกเวปไซท์ บน Open WRT หรือ บน Ubiquiti NanoStation M5 หรือ บน airOS
บล๊อกเวปไซท์ บน Open WRT หรือ บน  Ubiquiti NanoStation M5 หรือ บน airOSบล๊อกเวปไซท์ บน Open WRT หรือ บน  Ubiquiti NanoStation M5 หรือ บน airOS
บล๊อกเวปไซท์ บน Open WRT หรือ บน Ubiquiti NanoStation M5 หรือ บน airOS
 
Introduction to Data Centre 3.0
Introduction to Data Centre 3.0Introduction to Data Centre 3.0
Introduction to Data Centre 3.0
 
Windows Server 2012 R2 products & editions comparison
Windows Server 2012 R2 products & editions comparisonWindows Server 2012 R2 products & editions comparison
Windows Server 2012 R2 products & editions comparison
 
Settings MikroTik Router and Access Point to schedule AP radio on off via script
Settings MikroTik Router and Access Point to schedule AP radio on off via scriptSettings MikroTik Router and Access Point to schedule AP radio on off via script
Settings MikroTik Router and Access Point to schedule AP radio on off via script
 
แนะนำแนวทางการออกแบบ การปรับแต่ง การรับส่งสัญญาณ airFiber 24 - airFiber Desig...
แนะนำแนวทางการออกแบบ การปรับแต่ง การรับส่งสัญญาณ airFiber 24 - airFiber Desig...แนะนำแนวทางการออกแบบ การปรับแต่ง การรับส่งสัญญาณ airFiber 24 - airFiber Desig...
แนะนำแนวทางการออกแบบ การปรับแต่ง การรับส่งสัญญาณ airFiber 24 - airFiber Desig...
 
How to link public addresses (real ip) to private ip or lan ip
How to link public addresses (real ip) to private ip or lan ipHow to link public addresses (real ip) to private ip or lan ip
How to link public addresses (real ip) to private ip or lan ip
 
เอกสาร แนวทาง การอินติเกรท Mac OS X เข้ากับ ระบบ Active Directory อย่างไร Bes...
เอกสาร แนวทาง การอินติเกรท Mac OS X เข้ากับ ระบบ Active Directory อย่างไร Bes...เอกสาร แนวทาง การอินติเกรท Mac OS X เข้ากับ ระบบ Active Directory อย่างไร Bes...
เอกสาร แนวทาง การอินติเกรท Mac OS X เข้ากับ ระบบ Active Directory อย่างไร Bes...
 
Windows server 2012 r2 Hyper-v Component architecture
Windows server 2012 r2 Hyper-v Component architecture Windows server 2012 r2 Hyper-v Component architecture
Windows server 2012 r2 Hyper-v Component architecture
 
Gigabit Wi-Fi 802.11AC In Depth
Gigabit Wi-Fi 802.11AC In DepthGigabit Wi-Fi 802.11AC In Depth
Gigabit Wi-Fi 802.11AC In Depth
 
ค่า Tx Power Mode ใน Ubiquiti และ Mikrotik (RF Tx Power Mode Settings)
ค่า Tx Power Mode ใน Ubiquiti และ Mikrotik (RF Tx Power Mode Settings)ค่า Tx Power Mode ใน Ubiquiti และ Mikrotik (RF Tx Power Mode Settings)
ค่า Tx Power Mode ใน Ubiquiti และ Mikrotik (RF Tx Power Mode Settings)
 
SwOS (MikroTik Switch OS) Administration Guide
SwOS (MikroTik Switch OS) Administration GuideSwOS (MikroTik Switch OS) Administration Guide
SwOS (MikroTik Switch OS) Administration Guide
 
คู่มือเริ่มต้นใช้งานด่วน สำหรับ Excel 2013
คู่มือเริ่มต้นใช้งานด่วน สำหรับ Excel 2013คู่มือเริ่มต้นใช้งานด่วน สำหรับ Excel 2013
คู่มือเริ่มต้นใช้งานด่วน สำหรับ Excel 2013
 

Dernier

Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Dernier (20)

Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

FAQ - Rogue AP - What is Rogue Access Point?

  • 1. All You Wanted to Know About WiFi Rogue Access Points Gopinath K. N. Hemant Chaskar AirTight Networks www.AirTightNetworks.com A quick reference to Rogue AP security threat, Rogue AP detection and mitigation
  • 2. © 2009, AirTight Networks Inc. All Rights Reserved. What is Rogue AP Unmanaged (unauthorized) AP attached to enterprise wired network
  • 3. © 2009, AirTight Networks Inc. All Rights Reserved. How does Rogue AP pop up on enterprise network Malicious intent or simply unwitting, impatient employee Commoditization of WiFi APs raises the risk of someone putting up personal AP on the enterprise network It has been estimated that almost 20% of corporations have Rogue APs in their networks at some time Pocket APWall Jack AP PCMCIA and USB APs Wireless Router
  • 4. © 2009, AirTight Networks Inc. All Rights Reserved. Why is Rogue AP such a bad thing Rogue AP on network = (logically) LAN jack of your network hanging out of the premises RF signal spillage of Rogue AP provides access to wired enterprise network from outside of the premises
  • 5. © 2009, AirTight Networks Inc. All Rights Reserved. Attacks on wired network infrastructure • ARP poisoning, DHCP attacks, STP attacks, DoS attacks etc. Mapping the network for targeted attacks Scanning hosts on network for targeted attacks MIM (Man-In-Middle) and data sniffing on wired network See this blog article for details on attacks through Rogue AP http://blog.airtightnetworks.com/wifi-rogue-ap-5-ways- to-%e2%80%9cuse%e2%80%9d-it/ So, how can you protect enterprise network from Rogue APs? What are some specific attacks which can be launched through Rogue AP
  • 6. © 2009, AirTight Networks Inc. All Rights Reserved. Can the firewall protect from Rogue AP No! Firewall works at traffic transfer point between LAN & Internet Firewall does not detect Rogue AP Firewall does not see traffic through Rogue AP Internet Firewall Office Premises and LAN Rogue AP Attacker
  • 7. © 2009, AirTight Networks Inc. All Rights Reserved. Can WPA2 protect from Rogue APs No! You can enforce security controls such as WPA2 only on APs which you manage, i.e., your Authorized APs Rogue AP is not your managed AP In fact, most Rogue APs found in the field installed by naïve users either have • OPEN wireless link (out of box default) or • WEP wireless link (deterministically crackable)
  • 8. © 2009, AirTight Networks Inc. All Rights Reserved. Is 802.1X port control sufficient to protect from Rogue AP As a matter of fact, most networks do not have 802.1x port control today If even if 802.1x is deployed, it cannot protect from all Rogue AP configurations, some examples below: Rogue APs over bridging laptops MAC spoofer Legitimate user Rogue AP 802.1X
  • 9. © 2009, AirTight Networks Inc. All Rights Reserved. Can antivirus, wired IDS protect from Rogue AP No! Rogue AP threats operates at a layer below antivirus and wired IDS protection
  • 10. © 2009, AirTight Networks Inc. All Rights Reserved. Is NAC sufficient to protect from Rogue AP As a matter of fact, most networks do not have NAC deployed today If even if NAC is deployed, it cannot protect from all Rogue AP configurations, some examples below: Rogue APs over bridging laptops MAC spoofer Legitimate user Rogue AP NAC
  • 11. © 2009, AirTight Networks Inc. All Rights Reserved. So what protects network from Rogue APs Sensor based wireless intrusion prevention system (WIPS) which • Watches for Rogue APs 24x7 • Performs wired/wireless correlation for AP network connectivity testing to detect Rogue AP • Provides for automatic blocking of Rogue AP • Locates Rogue AP for easy searching and removal from the network
  • 12. © 2009, AirTight Networks Inc. All Rights Reserved. WIPS in action - Rogue AP protection See demonstration video at http://www.airtightnetworks.com/fileadmin/content_images/ demos/RogueAP-Demo/RogueAP-Demo.html
  • 13. © 2009, AirTight Networks Inc. All Rights Reserved. What are different types of Rogue APs Various permutations and combinations of • Bridging APs (on subnets coinciding with or different from wired interface address) • Router (NAT) APs (with and without MAC cloning) • APs with encrypted wireless links • APs with open wireless links • Soft APs (natively configured on wireless client or which use external devices such as USB sticks) • APs on different VLANs in the LAN including no-WiFi subnets
  • 14. © 2009, AirTight Networks Inc. All Rights Reserved. Can wire side only scanning protect from all Rogue AP No! Several Rogue AP types are undetectable by wire side only scanning, examples: • Bridging APs on a subnet inconsistent with their wired IP address (default configuration) • Soft APs • Router (NAT) APs with cloned wire side MAC address See http://blog.airtightnetworks.com/rogue-ap-detection- pci-compliance/ for more details
  • 15. © 2009, AirTight Networks Inc. All Rights Reserved. What does AP auto-classification mean in the context of Rogue AP All APs visible in air Managed APs (Static Part) Unmanaged APs (Dynamic Part) Not connected to my network Connected to my network Authorized AP External AP Rogue AP Automatically classifying APs visible in airspace into three categories: Authorized, External and Rogue
  • 16. © 2009, AirTight Networks Inc. All Rights Reserved. What is key technology enabler for accurate auto- classification Robust testing of AP’s connectivity to monitored enterprise network is the key technology enabler If AP is not detected as connected, when it is indeed connected to the monitored enterprise network, it results in security hole (false negative) If AP is detected as connected, when it is indeed not connected to the monitored enterprise network, it results in false alarm (false positive)
  • 17. © 2009, AirTight Networks Inc. All Rights Reserved. What are prevalent AP connectivity testing methods MAC Correlation (CAM table lookup) •Collect all MAC addresses seen on wired network (CAM table lookup) •Detect all MAC addresses seen on wireless network •Presume network connectivity of APs based on match between wired and wireless MAC addresses Signature Packet Injection • Inject signatures packets in the wired and wireless network • Detect which APs forward signature packets between wired and wireless interfaces • Confirm network connectivity of APs based on signature packet forwarding
  • 18. © 2009, AirTight Networks Inc. All Rights Reserved. How do these connectivity testing methods compare Packet injection method is superior to CAM table lookup as it is fast, accurate, gracefully scalable to large networks and capable of detecting all types of Rogue APs For more details on this comparison and auto-classification methods used in various WIPS in the market, see http://blog.airtightnetworks.com/ugly-bad-and-good-of- wireless-rogue-access-point-detection/ http://blog.airtightnetworks.com/making-the-right-choice- for-rogue-access-point-detection-technology/
  • 19. © 2009, AirTight Networks Inc. All Rights Reserved. How does WIPS block Rogue AP Over the air quarantine • WIPS sensor blocks client’s connection to Rogue AP by transmitting spoofed disconnection frames • Deauthentication is popularly used disconnection frame Switch port disable • WIPS attempts to locate switch port into which Rogue AP is connected • If found, disables the switch port using SNMP Rogue AP WIPS Sensor
  • 20. © 2009, AirTight Networks Inc. All Rights Reserved. How do the two Rogue AP blocking methods compare Over the air quarantine • Works independent of correlation between wired and wireless addresses of Rogue AP • Non-intrusive with network infrastructure • No interoperability problems with different switch vendors • Deauthentication based over the air quarantine will not work with .11w Rogue APs Switch port disable • Only works for those Rogue APs which have correlation between wired and wireless addresses • Highly intrusive. WIPS needs need to know “set” password on switches. Error in tracing leaf switch may turn off entire switch branch • Suffers from switch vendor interoperability problems
  • 21. © 2009, AirTight Networks Inc. All Rights Reserved. Conclusion Rogue AP is unmanaged AP plugged into wired enterprise network by unwilling or malicious employees or visitors Rogue AP can expose wired enterprise network to outsiders over its RF signal spillage Rogue AP threat is not mitigated by firewalls, WPA2, 802.1x, NAC, anti-virus or wire side scanners Sensor based wireless intrusion prevention system (WIPS) detects, blocks and locates Rogue APs Testing of AP’s connectivity to monitored enterprise network is key technology enabler for reliable protection from Rogue APs