ZyXEL NWA-3163 User Guide - Page 192

What You Can Do in the Rogue AP Screen, What You Need To Know About Rogue AP

Page 192 highlights

Chapter 15 Rogue AP Detection In the example above, a corporate network's security is compromised by a rogue AP (R) set up by an employee at his workstation in order to allow him to connect his notebook computer wirelessly (A). The company's legitimate wireless network (the dashed ellipse B) is well-secured, but the rogue AP uses inferior security that is easily broken by an attacker (X) running readily available encryption-cracking software. In this example, the attacker now has access to the company network, including sensitive data stored on the file server (C). 15.1.1 What You Can Do in the Rogue AP Screen • Use the Rogue AP > Configuration screen (see Section 15.2 on page 194) to enable your NWA's Rogue AP detection settings. You can choose to scan for rogue APs manually, or to have the NWA scan automatically at pre-defined intervals. • Use the Rogue AP > Friendly AP screen (see Section 15.2.1 on page 195) to specify APs as trusted. • Use the Rogue AP > Rogue AP screen (see Section 15.2.2 on page 196) to display details of all IEEE 802.11a/b/g/n wireless access points within the NWA's coverage area, except for the NWA itself and the access points included in the friendly AP list. 15.1.2 What You Need To Know About Rogue AP The following terms and concepts may help as you read through this chapter. You can configure the NWA to detect rogue IEEE 802.11a/n (5 GHz) and IEEE 802.11b/g (2.4 GHz) APs. You can also set the NWA to e-mail you immediately when a rogue AP is detected (see Chapter 19 on page 242 for information on how to set up e-mail logs). You can set how often you want the NWA to scan for rogue APs in the ROGUE AP > Configuration screen (see Section 15.2 on page 194). Friendly APs If you have more than one AP in your wireless network, you can configure a list of "friendly" APs. Friendly APs are other wireless access points, aside from the NWA, that are detected in your network, as well as any others that you know are not a threat (those from neighboring networks, for example). It is recommended that you export (save) your list of friendly APs often, especially if you have a network with a large number of access points. If you do not add them to the friendly AP list, these access points will appear in the Rogue AP list each time the NWA scans. 192 NWA-3160 Series User's Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372

Chapter 15 Rogue AP Detection
NWA-3160 Series User’s Guide
192
In the example above, a corporate network’s security is compromised by a rogue
AP (
R
) set up by an employee at his workstation in order to allow him to connect
his notebook computer wirelessly (
A
). The company’s legitimate wireless network
(the dashed ellipse
B
) is well-secured, but the rogue AP uses inferior security that
is easily broken by an attacker (
X
) running readily available encryption-cracking
software. In this example, the attacker now has access to the company network,
including sensitive data stored on the file server (
C
).
15.1.1
What You Can Do in the Rogue AP Screen
Use the
Rogue AP
>
Configuration
screen (see
Section 15.2 on page 194
) to
enable your NWA’s Rogue AP detection settings. You can choose to scan for
rogue APs manually, or to have the NWA scan automatically at pre-defined
intervals.
Use the
Rogue AP
>
Friendly AP
screen (see
Section 15.2.1 on page 195
) to
specify APs as trusted.
Use the
Rogue AP
>
Rogue AP
screen (see
Section 15.2.2 on page 196
) to
display details of all IEEE 802.11a/b/g/n wireless access points within the NWA’s
coverage area, except for the NWA itself and the access points included in the
friendly AP list.
15.1.2
What You Need To Know About Rogue AP
The following terms and concepts may help as you read through this chapter.
You can configure the NWA to detect rogue IEEE 802.11a/n (5 GHz) and IEEE
802.11b/g (2.4 GHz) APs.
You can also set the NWA to e-mail you immediately when a rogue AP is detected
(see
Chapter 19 on page 242
for information on how to set up e-mail logs).
You can set how often you want the NWA to scan for rogue APs in the
ROGUE AP
>
Configuration
screen (see
Section 15.2 on page 194
).
Friendly APs
If you have more than one AP in your wireless network, you can configure a list of
“friendly” APs. Friendly APs are other wireless access points, aside from the NWA,
that are detected in your network, as well as any others that you know are not a
threat (those from neighboring networks, for example). It is recommended that
you export (save) your list of friendly APs often, especially if you have a network
with a large number of access points. If you do not add them to the friendly AP
list, these access points will appear in the
Rogue AP
list each time the NWA
scans.