Dell PowerConnect W-Series FIPS Dell PowerConnect W-6000M3 and W-3000 Controll - Page 23

Mitigation of Other Attacks

Page 23 highlights

 a configuration provides wireless access without encryption The alternating bypass status can be identified by retrieving the port configuration or the wireless network configuration. Mitigation of Other Attacks ArubaOS includes two modules that provide protection from attacks. These are:  XSec  Wireless Intrusion Protection XSec xSec is a highly secure data link layer (Layer 2) protocol that provides a unified framework for securing all wired and wireless connections using strong encryption and authentication. xSec provides greater security than Layer 3 encryption technologies through the use of FIPS-validated encryption algorithms (AES-CBC256 with HMAC-SHA1) to secure Layer 2 traffic, as well as the encryption of Layer 2 header information including MAC addresses. xSec was jointly developed by Aruba Networks and Funk Software. Many government agencies and commercial entities that transmit highly sensitive information over wireless networks mandate that strong Layer 2 encryption technologies be deployed to ensure absolute data privacy. U.S. DoD Directive 8100.2 requires that all data transmitted using commercial wireless devices be encrypted at Layer 2 or Layer 3. The U.S. Navy and Army are requiring Layer 2 encryption, and cryptographic engines used for all sensitive government communications must be validated as meeting FIPS 140-2 requirements. xSec has been designed to address this requirement and to provide a number of additional benefits. Wireless Intrusion Detection Aruba's Wireless Intrusion Protection (WIP) module eliminates the need for a separate system of RF sensors and security appliances. The WIP module provides extraordinary capabilities to Aruba's enterprise mobility system, giving administrators visibility into the network, along with the power to thwart malicious wireless attacks, impersonations and unauthorized intrusions. Wireless intrusion detection is only the first step in securing the corporate environment from unwanted wireless access. Without adequate measures to quickly shut down intrusions, detection is almost worthless. Without accurate classification of APs and stations (e.g., valid, rogue, or neighbor), providing an automated response to possible intrusion is impossible. Aruba access points constantly scan all channels of the RF spectrum, capturing all 802.11 traffic and locally examining the captured data. Only policy violations are sent to the central controller to ensure minimal impact on wired network performance. While scanning the environment, the Aruba system learns about all wireless APs and stations and classifies these devices based on traffic flows seen on the wire and in the air. This traffic is collected and correlated on the controller. Aruba's WIP module provides both detection and prevention capabilities. Users and devices are detected and classified so administrators can react to both unintentional and malicious WLAN access. No other system on the market provides such capabilities. Unique Station and User Classification Aruba's patent-pending classification system automatically identifies and classifies all APs and stations connected to the network. The system works by comparing traffic seen in the air with traffic seen on the wire. When a match is found, it is known with certainty that the device belongs to the local network rather than a neighboring network. This avoids false alarms for the administrator, because only true rogue devices are classified as such. Aruba 3000, 6000/M3 and Dell W-3000, W-6000M3 | FIPS 140-2 Level 2 Release Supplement FIPS 140-2 Level 2 Features | 23

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32

Aruba 3000, 6000/M3 and Dell W-3000, W-6000M3
| FIPS 140-2 Level 2 Release Supplement
FIPS 140-2 Level 2 Features
|
23
a configuration provides wireless access without encryption
The alternating bypass status can be identified by retrieving the port configuration or the wireless network
configuration.
Mitigation of Other Attacks
ArubaOS includes two modules that provide protection from attacks. These are:
XSec
Wireless Intrusion Protection
XSec
xSec is a highly secure data link layer (Layer 2) protocol that provides a unified framework for securing all
wired and wireless connections using strong encryption and authentication. xSec provides greater security
than Layer 3 encryption technologies through the use of FIPS-validated encryption algorithms (AES-CBC-
256 with HMAC-SHA1) to secure Layer 2 traffic, as well as the encryption of Layer 2 header information
including MAC addresses. xSec was jointly developed by Aruba Networks and Funk Software.
Many government agencies and commercial entities that transmit highly sensitive information over wireless
networks mandate that strong Layer 2 encryption technologies be deployed to ensure absolute data privacy.
U.S. DoD Directive 8100.2 requires that all data transmitted using commercial wireless devices be encrypted
at Layer 2 or Layer 3. The U.S. Navy and Army are requiring Layer 2 encryption, and cryptographic engines
used for all sensitive government communications must be validated as meeting FIPS 140-2 requirements.
xSec has been designed to address this requirement and to provide a number of additional benefits.
Wireless Intrusion Detection
Aruba’s Wireless Intrusion Protection (WIP) module eliminates the need for a separate system of RF
sensors and security appliances. The WIP module provides extraordinary capabilities to Aruba’s enterprise
mobility system, giving administrators visibility into the network, along with the power to thwart malicious
wireless attacks, impersonations and unauthorized intrusions.
Wireless intrusion detection is only the first step in securing the corporate environment from unwanted
wireless access. Without adequate measures to quickly shut down intrusions, detection is almost worthless.
Without accurate classification of APs and stations (e.g., valid, rogue, or neighbor), providing an automated
response to possible intrusion is impossible.
Aruba access points constantly scan all channels of the RF spectrum, capturing all 802.11 traffic and locally
examining the captured data. Only policy violations are sent to the central controller to ensure minimal
impact on wired network performance. While scanning the environment, the Aruba system learns about all
wireless APs and stations and classifies these devices based on traffic flows seen on the wire and in the air.
This traffic is collected and correlated on the controller.
Aruba’s WIP module provides both detection and prevention capabilities. Users and devices are detected
and classified so administrators can react to both unintentional and malicious WLAN access. No other
system on the market provides such capabilities.
Unique Station and User Classification
Aruba’s patent-pending classification system automatically identifies and classifies all APs and stations
connected to the network. The system works by comparing traffic seen in the air with traffic seen on the
wire. When a match is found, it is known with certainty that the device belongs to the local network rather
than a neighboring network. This avoids false alarms for the administrator, because only true rogue devices
are classified as such.