Dell PowerConnect W-Series FIPS Dell PowerConnect W-6000M3 and W-3000 Controll - Page 24

Using Wireless to Protect your Existing Wireless Network

Page 24 highlights

Detecting and Disabling Rogue APs Aruba's classification algorithms allow the system to accurately determine who is a threat and who is not. Once classified as rogue, these APs can be automatically disabled. Administrators are also notified of the presence of rogue devices, along with their precise physical location on a floorplan, so that they may be removed from the network. Denial of Service and Impersonation Protection Wireless networks, by their nature, make an attractive target for denial of service attacks. Such attacks include software that floods the network with association requests, attacks that make a laptop look like thousands of APs, and deauthentication floods. Aruba controllers equipped with the Aruba WIP module maintain signatures of many different wireless attacks and are able to block them so service is not disrupted. Advanced Denial of Service (DoS) protection keeps enterprises safe against a variety of wireless attacks, including association and de-authentication floods, honeypots and AP and station impersonations. Based on location signatures and client classification, Aruba access points will drop illegal requests and generate alerts to notify administrators of the attack. Man-in-the-Middle Protection One of the common attacks possible in wireless networks is the "man-in-the-middle" attack. During a manin-the-middle attack, a hacker masquerades as a legitimate AP. Then, acting as a relay point, this man-in-themiddle fools users and other APs into sending data through the unauthorized device. An attacker can then modify or corrupt data or conduct password-cracking routines. Aruba access points monitor the air to detect other wireless stations masquerading as valid APs. When such masquerading is detected, appropriate defense mechanisms are put into place. Aruba controllers also track unique "signatures" for each wireless client in the network. If a new station is introduced claiming to be a particular client, but without the proper signature, a station impersonation attack is detected. Policy Definition and Enforcement Aruba WIP provides a number of policies that can be configured to take automatic action when a policy is violated. Examples of wireless policies include weak WEP implementation detection, AP misconfiguration protection, ad-hoc network detection and protection, unauthorized NIC type detection, wireless bridge detection and more. Using Wireless to Protect your Wired Network Even if wireless LANs are not sanctioned at this time, no security conscious company can afford to do nothing. Aruba's WIP will keep wireless traffic from working its way into the wired network through rogue APs unknowingly attached to a network port. With Aruba's mobility system equipped with WIP, the enterprise network is protected against wireless security holes. And when the enterprise is ready to deploy wireless LANs, the Aruba system can be easily reconfigured to provide a scalable and secure wireless LAN infrastructure. Using Wireless to Protect your Existing Wireless Network Aruba's mobility system with WIP delivers the detection and protection necessary to keep your existing wireless network safe from undesirable wireless access. ArubaOS WIP complements and enhances any existing WLAN deployment, including Cisco deployments, by providing advanced RF security and control features not found in first-generation wireless products. 24 | FIPS 140-2 Level 2 Features Aruba 3000, 6000/M3 and Dell W-3000, W-6000M3 | FIPS 140-2 Level 2 Release Supplement

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32

24
|
FIPS 140-2 Level 2 Features
Aruba 3000, 6000/M3 and Dell W-3000, W-6000M3
| FIPS 140-2 Level 2 Release Supplement
Detecting and Disabling Rogue APs
Aruba’s classification algorithms allow the system to accurately determine who is a threat and who is not.
Once classified as rogue, these APs can be automatically disabled. Administrators are also notified of the
presence of rogue devices, along with their precise physical location on a floorplan, so that they may be
removed from the network.
Denial of Service and Impersonation Protection
Wireless networks, by their nature, make an attractive target for denial of service attacks. Such attacks
include software that floods the network with association requests, attacks that make a laptop look like
thousands of APs, and deauthentication floods. Aruba controllers equipped with the Aruba WIP module
maintain signatures of many different wireless attacks and are able to block them so service is not
disrupted.
Advanced Denial of Service (DoS) protection keeps enterprises safe against a variety of wireless attacks,
including association and de-authentication floods, honeypots and AP and station impersonations. Based on
location signatures and client classification, Aruba access points will drop illegal requests and generate
alerts to notify administrators of the attack.
Man-in-the-Middle Protection
One of the common attacks possible in wireless networks is the “man-in-the-middle” attack. During a man-
in-the-middle attack, a hacker masquerades as a legitimate AP. Then, acting as a relay point, this man-in-the-
middle fools users and other APs into sending data through the unauthorized device. An attacker can then
modify or corrupt data or conduct password-cracking routines.
Aruba access points monitor the air to detect other wireless stations masquerading as valid APs. When such
masquerading is detected, appropriate defense mechanisms are put into place. Aruba controllers also track
unique “signatures” for each wireless client in the network. If a new station is introduced claiming to be a
particular client, but without the proper signature, a station impersonation attack is detected.
Policy Definition and Enforcement
Aruba WIP provides a number of policies that can be configured to take automatic action when a policy is
violated. Examples of wireless policies include weak WEP implementation detection, AP misconfiguration
protection, ad-hoc network detection and protection, unauthorized NIC type detection, wireless bridge
detection and more.
Using Wireless to Protect your Wired Network
Even if wireless LANs are not sanctioned at this time, no security conscious company can afford to do
nothing. Aruba’s WIP will keep wireless traffic from working its way into the wired network through rogue
APs unknowingly attached to a network port. With Aruba’s mobility system equipped with WIP, the
enterprise network is protected against wireless security holes. And when the enterprise is ready to deploy
wireless LANs, the Aruba system can be easily reconfigured to provide a scalable and secure wireless LAN
infrastructure.
Using Wireless to Protect your Existing Wireless Network
Aruba’s mobility system with WIP delivers the detection and protection necessary to keep your existing
wireless network safe from undesirable wireless access. ArubaOS WIP complements and enhances any
existing WLAN deployment, including Cisco deployments, by providing advanced RF security and control
features not found in first-generation wireless products.