Configuration Guide for RFMS 3.0 Initial Configuration. WiNG How-To Guide. Wireless IDS. January 2009 Revision A
|
|
|
- Austin Cummings
- 10 years ago
- Views:
Transcription
1 Configuration Guide for RFMS 3.0 Initial Configuration XXX-XXXXXX-XX WiNG How-To Guide Wireless IDS January 2009 Revision A
2 MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. Symbol is a registered trademark of Symbol Technologies, Inc. All other product or service names are the property of their respective owners Motorola, Inc. All rights reserved.
3 Table of Contents: 1. Introduction: Overview: Applications: Restrictions: Pre-Requisites: Requirements: Components Used: Configuration: Unauthorized AP Detection: Unauthorized AP Containment: Mobile Unit Intrusion Detection: SNMP Traps: RF Switch Running Configuration: Reference Documentation:...28 Page 3
4 1. Introduction: 1.1 Overview: Threats to WLANs are numerous and are potentially devastating to business and day to day operations. Security issues ranging from unauthorized Access Points (APs) or attacks can plague a WLAN and provide risk to sensitive information as well as impact performance. To aid in the detection and defense of potential threats, Motorola offers enterprises with a layered approach to security that includes integrated unauthorized AP detection, unauthorized AP containment and Wireless Intrusion Detection. Figure 1.1 Integrated Wireless IDS Services Unauthorized Access Point Detection: Unauthorized AP detection is a feature that is directly integrated into the RF Switch that when enabled allows the RF Switch to monitor the RF environment for unauthorized APs. Unauthorized APs can be reported to the RF Switch from managed radios configured to perform scanning or Motorola Mobile Units (MUs) reporting visible APs during roaming. Figure Unauthorized AP Detection Page 4
5 Unauthorized AP scanning is supported on AP100, AP300, AP5131 and AP7131 radios adopted by the RF Switch and is enabled on a per radio bases. This allows administrators to scan for APs throughout the whole network or specific areas in the network depending on the need. Each AP supports the following scanning modes: Single Channel Scanning Managed radios monitor the RF environment on the operating channel while simultaneously servicing mobile users. Detector Managed radios monitors all channels in the regulatory domain but cannot service mobile users. When an AP is detected by a managed radio or Motorola MU, the RF Switch will compare the reported MAC address and ESSID against an allowed AP rules list. Allowed AP rules can be configured on the RF Switch to exclude trusted or known APs which represent no threat to the network from generating alarms. If a reported AP is matched by an allow rule, the AP will be placed in an approved list and no alarm generated. If a reported AP is not matched by a rule, the AP will be placed in an unapproved list and an alarm generated. Detected APs will remain in the approved or unapproved list for as long as they are detected by the RF Switch. Detected APs will be automatically removed from the lists if the RF Switch fails to detect the AP within a configured time threshold defined by the Approved AP timeout and Unapproved AP timeout global settings. If an AP is not detected by the RF Switch for 300 seconds (default), the AP is removed from approved or unapproved list Unauthorized Access Point Containment: APs that have been categorized as unapproved represent a potential threat to the network. Unauthorized AP containment can be used to provide temporary mitigation against active unauthorized APs operating at a site by attempting to disrupt communications with any associated MUs as well as attempting to prevent new MUs from associating with the AP. Figure Unauthorized AP Containment Unauthorized AP containment can be performed by adding APs in the unauthorized AP list to a containment list. Once added the RF Switch will co-ordinate mitigation using AP300s by sending broadcast de-authentication frames to each MU spoofing the unauthorized APs MAC address. Depending on the site, one or more AP300 can be used to perform containment and the results will vary depending on the MU driver. Page 5
6 1.1.3 Wireless Intrusion Detection: The Motorola RF Switch can also be configured to monitor and alert administers about unauthorized attempts to access the WLAN. Unauthorized attempts are generally accompanied by malicious MUs attempting to identify network vulnerabilities. Integrated intrusion detection can be enabled on the RF Switch to provide monitoring for basic attacks without the need for deploying a dedicated IPS system. When violations occur and a configured threshold is exceeded, the RF Switch will generate an alarm and syslog entry for the event and if enabled perform mitigation by blacklisting the MU for a configured amount of time. Table 1.3 shows the intrusion detection violations supported on the RF Switch: Excessive Probes Excessive Association Excessive Disassociation Excessive Authentication Failure Excessive Crypto Replays Excessive Replays Excessive Decryption Failures Excessive Unassociated Frames Excessive EAP Start Frames Null Destination Same Source / Destination MAC Source Multicast MAC TKIP Countermeasures Invalid Frame Length Excessive EAP NAKS Invalid 802.1x Frames Invalid Frame Type Beacon with Broadcast ESSID Frames with Known Bad ESSIDs Unencrypted Traffic Frames with Non-Changing WEP IV Detect Adhoc Networks De-Authentication from Broadcast Source MAC Invalid Sequence Number Weak WEP IV Table Wireless Intrusion Detection Violations The RF Switch can detect numerous violations each with configurable thresholds for the RF Switch, managed radios and individual MUs. Each threshold defines the number of violations that must occur on the RF Switch, radio or MU within a globally configured detection window before an alarm is generated and mitigation is performed. For each violation the RF Switch maintains separate counters for the switch, individual radios and individual MUs. The counters are cumulative allowing distributed attacks to be detected. When a violation occurs the counter will be increased by one for the MU performing the violation, the radio the MU was associated with and the switch managing the AP. If the radio or switch counters exceed the configured threshold within a specified detection window the RF Switch will generate an alarm. If the MU threshold is exceeded by a specific MU, the RF Switch will generate an alarm as well as automatically blacklist the MU for a specified interval providing automatic mitigation against the event. Page 6
7 1.2 Applications: The integrated WIDS security features are intended for small, medium and large customers who require basic rogue AP detection, rogue AP containment and wireless intrusion detection. The integrated security features can be deployed in any enterprise environment and industry vertical to provide detection and mitigation from potential threats. 1.3 Restrictions: The integrated security features are intended to provide basic protection against unauthorized APs and wireless threats. Additional comprehensive protection can be provided by deploying the Motorola AirDefense Enterprise solution which is an industry leading Wireless IPS system that seamlessly integrates with Motorola RF Switches and Access Points. With built-in forensic support and industry standard reports for PCI, HIPAA, Sarbanes-Oxley, GLBA, FDIC and DOD, Motorola's Wireless Intrusion Protection System (IPS) provides powerful tools for standards compliance, as well as around-the-clock a/b/g wireless network security in a distributed environment. It allows administrators to identify and accurately locate attacks, rogue devices, and network vulnerabilities in real time and permits both wired and wireless lockdown of wireless device connections. The Motorola AirDefense System provides the following advanced features: 24x7 Dedicated Sensors Real-time identification of hackers, attacks and system weak spots. Historical Database By storing and managing more than 270 data points per connection per wireless device per minute the product provides a highly accurate assessment of wireless threats including anomalies and zero-day attacks. Allows viewing of events months later to improve network security posture and assist in forensic investigations. Forensic Support Pertinent historical data supports advanced forensics such as time of attack/breach, entry point used, length of exposure, systems compromised, device activity logs and transfers of data. Multiple Detection Technologies Provides accurate and comprehensive detection by applying multiple detection technologies including signature analysis, protocol abuse and anomalous behavior in conjunction with correlation across multiple sensors. Location Based Security Provides location of unauthorized devices and activities using Motorola WLAN infrastructure. Reports Provides built-in reports for PCI, HIPAA, Sarbanes-Oxley, GLBA, FDIC and DOD, as well as forensic support to determine compliance level after the fact, should a security event occur. Plug-and-Play Operation Auto-classification allows for a quick policy-based authorization of APs and devices. Network traffic can be monitored within minutes of installation, complete with the tools to quickly interpret information for fast response to Wireless LAN threats. Centralized Detection Engine Eliminates the need to upgrade sensors individually a single server upgrade provides new functionality and protection against the latest attacks and new threats. Report Builder Allows customized reports to suit your specific needs. Advanced Forensics Adds a whole new level of depth and flexibility to forensic investigations, allowing the user to "zoom" the time period of analysis in and out, to graph data for easier analysis, and to do historical location tracking. Page 7
8 2. Pre-Requisites: 2.1 Requirements: The following requirements must be met prior to attempting this configuration: One or more RF Switches are installed and operational on the network. One or more AP300 Access Ports configured and adopted by the RF Switch. A Windows XP workstation with a console, telnet or SSH client is available to perform configuration on the RF Switches. One or more standalone Access Points to verify unauthorized AP detection and containment. One or more wireless workstations are available to test and verify unauthorized AP containment and intrusion detection. The reader has read the Motorola RFS Series Wireless LAN Switches - WiNG System Reference Guide. 2.2 Components Used: The information in this document is based on the following Motorola hardware and software versions: 1 x RFS6000 Version x AP300s. Registered users may download the latest software and firmware from the Motorola Technical Support Site Page 8
9 3. Configuration: The following sections outline the configuration steps required to enable unauthorized AP detection and intrusion detection on an RF Switch: 1) Unauthorized AP Detection [Section 3.1]: 2) Unauthorized AP Containment [Section 3.2]: 3) Mobile Unit Intrusion Detection [Section 3.3]: 4) SNMP Traps [Section 3.4]: 3.1 Unauthorized AP Detection: As shown in figure 3.1, an RF Switch is deployed at a site with four AP300s. The administrator wants to enable unauthorized AP detection to be proactively alerted when any APs are added or removed from the site. To provide unauthorized detection, three AP300s will be configured to perform single channel scanning while providing WLAN services to users. The three APs will monitor the 2.4GHz channels 1, 6 and 11 and 5GHz channels 36, 40 & 48. The fourth AP300 will be configured as a dedicated detector AP and will monitor all channels within the regulatory domain. Using three AP300s with single channel scanning and a dedicated detector APs will provide the RF Switch with complete visibility into the 2.4GHz and 5GHz spectrum at this site. Figure 3.1 Unauthorized AP Detection Page 9
10 3.1.1 Web UI Configuration Example: The following configuration example will demonstrate how to globally enable unauthorized AP detection on an RF Switch and configure AP300 scanning options using the Web UI: 1) In the menu tree select Network > Access Port Radios then select the Configuration tab. Highlight and select an AP300 radio then click Edit. 2) In the Network > Access Port Radio > Configuration window under Properties, check the option Single-channel scan for Unapproved APs or Dedicate this AP as a Detector AP. In this example radios 1-4 & 7-8 will be configured for single channel scanning and radios 5-6 will be configured as dedicated detectors. Page 10
11 3) In the menu tree select Security > Access Point Detection then select the Configuration tab. Check the Enable to globally enable unauthorized AP detection on the switch then click Apply. If Motorola devices are being deployed, you may optionally enable MU Assisted Scanning which leverages Motorola client extensions on Motorola devices to provide additional detection. 4) In the menu tree select Security > Access Point Detection then select the Unapproved APs (AP Reported) tab. All detected APs will be listed in this table. 5) Click Save to apply and save changes. Page 11
12 3.2 Unauthorized AP Containment: To provide temporary remediation in the event that an unauthorized AP is placed at the site, unauthorized AP containment will be enabled on the RF Switch. Once enabled the RF Switch will perform RF countermeasures against any unauthorized AP MAC addresses added to the containment list Web UI Configuration Example: Figure 3.2 Unauthorized AP Containment The following configuration example will demonstrate how to globally enable unauthorized AP containment and contain an unauthorized AP using the Web UI: 1) In the menu tree select Security > Access Point Detection then select the AP Containment tab. Check the option Enable Containment then click Apply. Page 12
13 2) Select the Unapproved APs (AP Reported) tab. To contain an unauthorized AP, select an entry from the Unapproved APs list then click Contain. This will add the MAC address of the unauthorized AP to the AP Containment list. Care should be taken when using unauthorized AP containment to ensure that containment is not being performed on valid neighboring APs. 3) Select the AP Containment tab. The unauthorized AP added in step 2 will be listed in the containment list. In the AP Containment tab you can manually add additional unauthorized AP MAC addresses to the containment list as well as remove unauthorized APs from the containment list. 4) Click Save to apply and save changes. Page 13
14 3.3 Mobile Unit Intrusion Detection: To provide proactive protection against active intrusion attempts, mobile unit intrusion detection will be enabled on the RF Switch. The RF Switch can detect numerous intrusion violations and can alert administrators of intrusion attempts and attacks as well as provide mitigation by automatically blacklisting mobile units triggering the violation. In this example the following configuration will be performed: 1) The global detection window will be increased from 10 seconds to 60 seconds. 2) The MU Excessive Authentication Failure threshold will be set to 10. If 10 authentication failures occur from a specific MU within a 60 second window, an alarm will be generated and the MU blacklisted. 3) The Radio and Switch Excessive Authentication Failure thresholds will be set to 20. If 20 authentication failures occur on a single radio or globally on the RF Switch the within a 60 second window, an alarm will be generated. 4) The Time to Filter for the Excessive Authentication Failure intrusion violation will be set to 300 seconds. If an MU triggers the intrusion violation, the MUs MAC address will be filtered for 5 minutes. Figure 3.3 Mobile Unit Violation Page 14
15 3.3.1 Web UI Configuration Example: The following configuration example will demonstrate how to enable mobile unit intrusion detection for excessive authentication failures using the Web UI: 1) In the menu tree select Security > Mobile Unit Intrusion Detection then select the Configuration tab. In the Detection Window field specify the detection window interval (in seconds) the RF Switch will use to scan for violations. In this example a 60 second detection window will be configured. Click Apply. 2) In the Violation Parameters table, locate Excessive Authentication failure then enter a threshold value in the Mobile Unit, Radio and Switch fields. Additionally in the Time to Filter field enter a value (in seconds) that the mobile unit will be blacklisted when violations occur. In this example the Mobile Unit threshold will be set to 10 and the Radio and Switch thresholds set to 20. Additionally the Time to Filter violating MUs will be set to 300. Click Apply. Page 15
16 3) Select the Filtered MUs tab. Any mobile units that have violated an event will be listed in the table. 4) Click Save to apply and save changes. Page 16
17 3.4 SNMP Traps: To provide proactive alerting of unauthorized APs and intrusion events, an RFMS 3.0 server will be defined on the RF Switch as an SNMP trap receiver and unauthorized AP and intrusion detection traps enabled. When the RF Switch detects an unauthorized AP or a intrusion detection violation, the RF Switch will forward an SNMP trap to the RFMS server Web UI Configuration Example: Figure 3.4 SNMP Traps The following configuration example will demonstrate how to enable SNMP traps to an RFMS 3.0 server for unauthorized APs and mobile unit intrusion detection violations using the Web UI: 1) In the menu tree select Management Access > SNMP Trap Receivers then click Add. Page 17
18 2) In the Management Access > SNMP Traps window, enter the IP Address of the RFMS 3.0 server. Under Protocol Options select the SNMP version then click OK. 3) In the menu tree select Management Access > SNMP Trap Configuration then select the Configuration tab. In the All Traps tree, locate AP Detection then select the Unapproved AP detected and Unapproved AP removed traps. Click Enable Trap. Page 18
19 4) Click Apply. 5) In the menu tree select Management Access > SNMP Trap Configuration then select the Configuration tab. In the All Traps tree, locate Intrusion Detection then select the Excessive violation from mobile unit, Excessive violation from radio and Excessive violation from switch traps. Click Enable Trap. Page 19
20 6) Click Apply. 7) In the menu tree select Management Access > SNMP Trap Configuration. Check the option Allow Traps to be generated then click Apply. 8) Click Save to apply and save changes. Page 20
21 9) SNMP traps for unauthorized APs and mobile unit intrusion detection violations will now be forwarded to RFMS. Page 21
22 4. RF Switch Running Configuration: The following shows the running configuration of the RFS6000 switch used to create this guide: RFS6000# show running-config configuration of RFS6000 version R version 1.2 aaa authentication login default local none service prompt crash-info username "admin" password 1 b6b6ccabdb c7fbdf436ec2ed86bf931e username "admin" privilege superuser username "operator" password 1 b6b6ccabdb c7fbdf436ec2ed86bf931e spanning-tree mst configuration name My Name crypto pki trustpoint ESELAB subject-name "rfs6000" US "TN" "Johnson City" "Motorola Inc." "WLAN Enterprise Division" fqdn "rfs6000.eselab.com" ip-address management secure ip domain-name eselab.com ip name-server no bridge multiple-spanning-tree enable bridge-forward country-code us logging buffered 7 logging console 4 logging host snmp-server community public ro snmp-server community private rw snmp-server engineid netsnmp 6b8b456748daa1a5 snmp-server location Johnson City TN snmp-server contact [email protected] snmp-server sysname RFS6000 snmp-server manager v2 snmp-server manager v3 snmp-server user snmptrap v3 encrypted auth md5 0xe3e4b0c4acafa27f6a23ad77d69ac182 Page 22
23 snmp-server user snmpmanager v3 encrypted auth md5 0xe3e4b0c4acafa27f6a23ad77d69ac182 snmp-server user snmpoperator v3 encrypted auth md5 0x4fc3ccf48e7c1c7780f936f8cb3fcc64 snmp-server host v2c snmp-server enable traps snmp-server enable traps wireless ap-detection externalapdetected snmp-server enable traps wireless ap-detection externalapremoved snmp-server enable traps wireless ids muexcessiveevents snmp-server enable traps wireless ids radioexcessiveevents snmp-server enable traps wireless ids switchexcessiveevents ip http server ip http secure-trustpoint ESELAB ip http secure-server ip ssh ip telnet no service pm sys-restart timezone America/New_York service radius license AP fc781051ebf9d99ced010a4dab46a63a760c66f54b1c496da322d3cd41d046777fbed80f433b68ea wireless secure-wispe-default-secret 0 new-pre-shared-key no adopt-unconf-radio enable manual-wlan-mapping enable wlan 1 enable wlan 1 description MOTO-DATA wlan 1 ssid MOTO-DATA wlan 1 vlan 40 wlan 1 encryption-type tkip wlan 1 authentication-type eap wlan 1 radius server primary wlan 1 radius server primary radius-key 0 ESELAB wlan 1 radius reauth 3600 wlan 1 radius accounting server primary wlan 1 radius accounting server primary radius-key 0 ESELAB wlan 1 dot11i preauthentication wlan 2 enable wlan 2 description MOTO-GUEST wlan 2 ssid MOTO-GUEST wlan 2 vlan 70 wlan 2 authentication-type hotspot wlan 2 hotspot webpage-location advanced wlan 2 radius server primary wlan 2 radius server primary radius-key 0 ESELAB wlan 2 radius accounting server primary wlan 2 radius accounting server primary radius-key 0 ESELAB wlan 3 enable Page 23
24 wlan 3 description MOTO-VOICE wlan 3 ssid MOTO-VOICE wlan 3 vlan 80 wlan 3 encryption-type tkip wlan 3 dot11i phrase 0 motovoicetest wlan 3 dot11i preauthentication radio add F a ap300 radio 1 description AP300-1-A radio 1 bss 1 1 radio 1 channel-power indoor radio 1 on-channel-scan radio 1 adoption-pref-id 100 radio add F bg ap300 radio 2 description AP300-1-BG radio 2 bss 1 1 radio 2 bss 2 2 radio 2 bss 3 3 radio 2 channel-power indoor 1 18 radio 2 on-channel-scan radio 2 short-preamble radio 2 adoption-pref-id 100 radio add B2-FD-CF 11a ap300 radio 3 description AP300-2-A radio 3 bss 1 1 radio 3 channel-power indoor radio 3 on-channel-scan radio 3 adoption-pref-id 200 radio add B2-FD-CF 11bg ap300 radio 4 description AP300-2-BG radio 4 bss 1 1 radio 4 bss 2 2 radio 4 bss 3 3 radio 4 channel-power indoor 6 18 radio 4 on-channel-scan radio 4 short-preamble radio 4 adoption-pref-id 200 radio add B2-FD-D0 11a ap300 radio 5 description AP300-3-A radio 5 bss 1 1 radio 5 channel-power indoor radio 5 detector radio 5 adoption-pref-id 100 radio add B2-FD-D0 11bg ap300 radio 6 description AP300-3-BG radio 6 bss 1 1 radio 6 bss 2 2 Page 24
25 radio 6 bss 3 3 radio 6 channel-power indoor radio 6 detector radio 6 short-preamble radio 6 adoption-pref-id 100 radio add D5-DA-CE 11a ap300 radio 7 description AP300-4-A radio 7 bss 1 1 radio 7 channel-power indoor radio 7 on-channel-scan radio add D5-DA-CE 11bg ap300 radio 8 description AP300-4-BG radio 8 bss 1 1 radio 8 bss 2 2 radio 8 bss 3 3 radio 8 channel-power indoor 1 4 radio 8 on-channel-scan radio 8 short-preamble no ap-ip default-ap switch-ip ap-detection enable ids detect-window 60 ids ex-ops authentication-fails threshold mu 10 ids ex-ops authentication-fails threshold radio 20 ids ex-ops authentication-fails threshold switch 20 ids ex-ops authentication-fails filter-ageout 300 ap-containment enable ap-containment add EF-88-6F smart-rf radio 1 radio-mac E-27-6C radio 2 radio-mac E-3F-1C radio 3 radio-mac CD-82-BC radio 4 radio-mac CD radio 5 radio-mac CD-83-6C radio 6 radio-mac CD radio 7 radio-mac D0-24-4C radio 8 radio-mac D0-23-EC radio 9 radio-mac D radio 10 radio-mac D radius-server local authentication eap-auth-type all nas /24 key 0 ESELAB radius-server local Page 25
26 interface ge1 switchport access vlan 10 interface ge2 switchport access vlan 10 interface ge3 switchport access vlan 10 interface ge4 switchport access vlan 10 interface ge5 switchport access vlan 10 interface ge6 switchport access vlan 10 interface ge7 switchport access vlan 10 interface ge8 switchport access vlan 10 interface me1 no ip address interface up1 description Uplink switchport mode trunk switchport trunk native vlan 10 switchport trunk native tagged switchport trunk allowed vlan none switchport trunk allowed vlan add 10,12,40,70,80, interface vlan1 no ip address shutdown interface vlan10 management description SERVICES ip address /24 Page 26
27 interface vlan70 description GUEST ip address /24 rtls rfid espi sole ip route / ntp server prefer line con 0 line vty 0 24 end Page 27
28 5. Reference Documentation: Description Motorola RFS Series Wireless LAN Switches WiNG System Reference Guide Motorola RF Switch CLI Reference Guide Location Page 28
29
APPLICATION NOTES Seamless Integration of LAN and WLAN through Brocade mobility products and
Seamless Integration of LAN and WLAN through Brocade mobility products and ShoreTel VoIP Phones This solution leverages interoperable and best-of-breed networking and security products, tailored to fit
WiNG 5.X How-To Guide
WiNG 5.X How-To Guide Captive Portals Part No. TME-12-2012-01 Rev. A MOTOROLA, MOTO, MOTOROLA SOLUTIONS and the Stylized M Logo are trademarks or registered trademarks of Motorola Trademark Holdings, LLC
WiNG5 DESIGN GUIDE By Sriram Venkiteswaran. WiNG5 Wireless Association Filters. How To Guide
WiNG5 DESIGN GUIDE By Sriram Venkiteswaran WiNG5 Wireless Association Filters How To Guide June, 2011 TABLE OF CONTENTS HEADING STYLE INTRODUCTION... 1 Overview... 1 Applications... 1 Restrictions... 1
Configuration Guide for RFMS 3.0 Initial Configuration. WiNG 5 How-To Guide. Digital Certificates. July 2011 Revision 1.0
Configuration Guide for RFMS 3.0 Initial Configuration XXX-XXXXXX-XX WiNG 5 How-To Guide Digital Certificates July 2011 Revision 1.0 MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark
Configuration Guide for RFMS 3.0 Initial Configuration. WiNG 5 How-To Guide. Role-Based Firewall. June 2011 Revision 1.0
Configuration Guide for RFMS 3.0 Initial Configuration XXX-XXXXXX-XX WiNG 5 How-To Guide Role-Based Firewall June 2011 Revision 1.0 MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark
MSC-131. Design and Deploy AirDefense Solutions Exam. http://www.examskey.com/msc-131.html
Motorola MSC-131 Design and Deploy AirDefense Solutions Exam TYPE: DEMO http://www.examskey.com/msc-131.html Examskey Motorola MSC-131 exam demo product is here for you to test the quality of the product.
Closing Wireless Loopholes for PCI Compliance and Security
Closing Wireless Loopholes for PCI Compliance and Security Personal information is under attack by hackers, and credit card information is among the most valuable. While enterprises have had years to develop
WiNG 5.X How To. Policy Based Routing Cache Redirection. Part No. TME-05-2012-01 Rev. A
WiNG 5.X How To Policy Based Routing Cache Redirection Part No. TME-05-2012-01 Rev. A MOTOROLA, MOTO, MOTOROLA SOLUTIONS and the Stylized M Logo are trademarks or registered trademarks of Motorola Trademark
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
Apple Airport Extreme Base Station V4.0.8 Firmware: Version 5.4
1. APPLE AIRPORT EXTREME 1.1 Product Description The following are device specific configuration settings for the Apple Airport Extreme. Navigation through the management screens will be similar but may
WiNG5 CAPTIVE PORTAL DESIGN GUIDE
WiNG5 DESIGN GUIDE By Sriram Venkiteswaran WiNG5 CAPTIVE PORTAL DESIGN GUIDE June, 2011 TABLE OF CONTENTS HEADING STYLE Introduction To Captive Portal... 1 Overview... 1 Common Applications... 1 Authenticated
Wireless Security and Healthcare Going Beyond IEEE 802.11i to Truly Ensure HIPAA Compliance
Going Beyond IEEE 802.11i to Truly Ensure HIPAA Compliance 339 N. Bernardo Avenue, Suite 200 Mountain View, CA 94043 www.airtightnetworks.net Wireless LANs are prevalent in healthcare institutions. The
WiNG 5.X Reference. Best Practices & Recommendations. Part No. TME-02-2013-01 Rev. D
WiNG 5.X Reference Best Practices & Recommendations Part No. TME-02-2013-01 Rev. D MOTOROLA, MOTO, MOTOROLA SOLUTIONS and the Stylized M Logo are trademarks or registered trademarks of Motorola Trademark
AP6511 First Time Configuration Procedure
AP6511 First Time Configuration Procedure Recommended Minimum Configuration Steps From the factory, all of the 6511 AP s should be configured with a shadow IP that starts with 169.254.xxx.xxx with the
WiNG 5.X Reference. Best Practices & Recommendations. Part No. TME-03-2013-18 Rev. E
WiNG 5.X Reference Best Practices & Recommendations Part No. TME-03-2013-18 Rev. E MOTOROLA, MOTO, MOTOROLA SOLUTIONS and the Stylized M Logo are trademarks or registered trademarks of Motorola Trademark
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
Ensuring HIPAA Compliance in Healthcare
The Intelligent Wireless Networking Choice WHITE PAPER Ensuring HIPAA Compliance in Healthcare Overview Wireless LANs are prevalent in healthcare institutions. The constant need for mobility among doctors,
WHITE PAPER. WEP Cloaking for Legacy Encryption Protection
WHITE PAPER WEP Cloaking for Legacy TM Encryption Protection Introduction Wired Equivalent Privacy (WEP) is the encryption protocol defined in the original IEEE 802.11 standard for Wireless Local Area
Unified Access Point Administrator's Guide
Unified Access Point Administrator's Guide Product Model: DWL-3600AP DWL-6600AP DWL-8600AP Unified Wired & Wireless Access System Release 2.0 November 2011 Copyright 2011. All rights reserved. November
Configuring Security Solutions
CHAPTER 3 This chapter describes security solutions for wireless LANs. It contains these sections: Cisco Wireless LAN Solution Security, page 3-2 Using WCS to Convert a Cisco Wireless LAN Solution from
CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security
CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by
How To Protect A Wireless Lan From A Rogue Access Point
: Understanding Security to Ensure Compliance with HIPAA Healthcare is a natural environment for wireless LAN solutions. With a large mobile population of doctors, nurses, physician s assistants and other
WHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks
WHITE PAPER The Need for Wireless Intrusion Prevention in Retail Networks The Need for Wireless Intrusion Prevention in Retail Networks Firewalls and VPNs are well-established perimeter security solutions.
Observer Analyzer Provides In-Depth Management
Comprehensive Wireless Network Management Made Simple From deploying access points to baselining activity to enforcing corporate security policies, the Observer Performance Management Platform is a complete,
Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline
Overview The following note covers information published in the PCI-DSS Wireless Guideline in July of 2009 by the PCI Wireless Special Interest Group Implementation Team and addresses version 1.2 of the
Recommended 802.11 Wireless Local Area Network Architecture
NATIONAL SECURITY AGENCY Ft. George G. Meade, MD I332-008R-2005 Dated: 23 September 2005 Network Hardware Analysis and Evaluation Division Systems and Network Attack Center Recommended 802.11 Wireless
Web Authentication Proxy on a Wireless LAN Controller Configuration Example
Web Authentication Proxy on a Wireless LAN Controller Configuration Example Document ID: 113151 Contents Introduction Prerequisites Requirements Components Used Conventions Web Authentication Proxy on
Technical Brief. Wireless Intrusion Protection
Technical Brief Wireless Intrusion Protection Introduction One layer of the multi-layer wireless security solution provided by Aruba Wireless Networks is the ability to lock the air using wireless intrusion
Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example
Table of Contents Wi Fi Protected Access 2 (WPA 2) Configuration Example...1 Document ID: 67134...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...2 Conventions...2 Background Information...2
WLAN Security: Identifying Client and AP Security
WLAN Security: Identifying Client and AP Security 2010 Cisco Systems, Inc. All rights reserved. CUWN v7.0 4-1 Lesson Overview & Objectives Overview This lesson provides detailed discussions on the Cisco
Configuration Guide for RFMS 3.0 Initial Configuration. WiNG5 How-To Guide. Network Address Translation. July 2011 Revision 1.0
Configuration Guide for RFMS 3.0 Initial Configuration XXX-XXXXXX-XX WiNG5 How-To Guide Network Address Translation July 2011 Revision 1.0 MOTOROLA and the Stylized M Logo are registered in the US Patent
1.1 Demonstrate how to recognize, perform, and prevent the following types of attacks, and discuss their impact on the organization:
Introduction The PW0-204 exam, covering the 2010 objectives, will certify that the successful candidate understands the security weaknesses inherent in WLANs, the solutions available to address those weaknesses,
Securing end devices
Securing end devices Securing the network edge is already covered. Infrastructure devices in the LAN Workstations Servers IP phones Access points Storage area networking (SAN) devices. Endpoint Security
Unified Access Point Administrator s Guide
Page 1 Table of Contents Section 1 - About This Document...9 Document Organization... 9 Additional Documentation... 9 Document Conventions... 9 Online Help, Supported Browsers, and Limitations... 10 Section
SonicWALL PCI 1.1 Implementation Guide
Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard
Wireless Network Analysis. Complete Network Monitoring and Analysis for 802.11a/b/g/n
Wireless Network Analysis Complete Network Monitoring and Analysis for 802.11a/b/g/n Comprehensive Wireless Network Management Made Simple From deploying access points to baselining activity to enforcing
Air Marshal. White Paper
White Paper Air Marshal SEPTEMBER 2013 This document discusses potential security threats in a WiFi environment, and outlines how enterprises can use a best-in-class Wireless Intrusion Prevention System
Features Description Benefit AP-7131N support Adaptive AP Support for the AP7131N-GR and AP7131N- GRN
Release Notes for RFS7000 v4.1.0.0-040gr Contents 1. Introduction to New Features 2. Features Added for FIPS Compliance 3. Features Disabled or Modified for FIPS Compliance 4. Firmware Versions & Compatibility
Deploying Cisco Basic Wireless LANs WDBWL v1.1; 3 days, Instructor-led
Deploying Cisco Basic Wireless LANs WDBWL v1.1; 3 days, Instructor-led Course Description This 3-day instructor-led, hands-on course provides learners with skills and resources required to successfully
Mobility System Software Quick Start Guide
Mobility System Software Quick Start Guide Version 8.0 P/N 530-041387 Rev.05 Table of Contents About this Guide Using the Web Quick Start (WLC2, WLC8, WLC200,WLC800R, and WLC880R) Remotely Configuring
PCI Wireless Compliance with AirTight WIPS
A White Paper by AirTight Networks, Inc. 339 N. Bernardo Avenue, Suite 200, Mountain View, CA 94043 www.airtightnetworks.com 2013 AirTight Networks, Inc. All rights reserved. Introduction Although [use
Ruckus Wireless ZoneDirector Command Line Interface
Ruckus Wireless ZoneDirector Command Line Interface Reference Guide Part Number 800-70258-001 Published September 2010 www.ruckuswireless.com Contents About This Guide Document Conventions................................................
Using AirWave RAPIDS Rogue Detection to Implement Your Wireless Security and PCI Compliance Strategy
Using AirWave RAPIDS Rogue Detection to Implement Your Wireless Security and PCI Compliance Strategy Table of Contents Introduction 3 Using AirWave RAPIDS to detect all rogues on your network 4 Rogue device
A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model
A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model Table of Contents Introduction 3 Deployment approaches 3 Overlay monitoring 3 Integrated monitoring 4 Hybrid
Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches
print email Article ID: 4941 Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches Objective In an ever-changing business environment, your
Unified Access Point (AP) Administrator s Guide
Unified Access Point (AP) Administrator s Guide Product Model : DWL-3500AP DWL-8500AP Unified Wired & Wireless Access System Release 2.1 February 2008 Copyright 2008. All rights reserved. D-Link Unified
Wireless Local Area Networks (WLANs)
4 Wireless Local Area Networks (WLANs) Contents Overview...................................................... 4-3 Configuration Options: Normal Versus Advanced Mode.............. 4-4 Normal Mode Configuration..................................
Configuration Guide for RFMS 3.0 Initial Configuration. WiNG 5 How-To Guide. Firewall. June 2011 Revision 1.0
Configuration Guide for RFMS 3.0 Initial Configuration XXX-XXXXXX-XX WiNG 5 How-To Guide Firewall June 2011 Revision 1.0 MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office.
Microsoft Lync Certification Configuration Guide for WiNG 5.5
Microsoft Lync Certification Configuration Guide for WiNG 5.5 December 2013 Revision 1 MOTOROLA, MOTO, MOTOROLA SOLUTIONS and the Stylized M Logo are trademarks or registered trademarks of Motorola Trademark
ExtremeWireless Getting Started Guide
ExtremeWireless Getting Started Guide Release V10.11.01 9035004 Published June 2016 Copyright 2016 Extreme Networks, Inc. All rights reserved. Legal Notice Extreme Networks, Inc. reserves the right to
All You Wanted to Know About WiFi Rogue Access Points
All You Wanted to Know About WiFi Rogue Access Points A quick reference to Rogue AP security threat, Rogue AP detection and mitigation Gopinath K. N. Hemant Chaskar AirTight Networks www.airtightnetworks.com
Abstract. Avaya Solution & Interoperability Test Lab
Avaya Solution & Interoperability Test Lab Application Notes for Configuring Enterasys Wireless Access Point 3000 (RBT3K-AG) to Support Avaya IP Office, Avaya IP Wireless Telephones and Avaya Phone Manager
ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3
ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3 TO THE Overview EXHIBIT T to Amendment No. 60 Secure Wireless Network Services are based on the IEEE 802.11 set of standards and meet the Commonwealth of Virginia
Wireless LAN Access Point. IEEE 802.11g 54Mbps. User s Manual
Wireless LAN Access Point IEEE 802.11g 54Mbps User s Manual Table of Contents Chapter 1 Introduction... 1 1.1 Package Contents...2 1.2 Features...2 1.3 Specifications...2 1.4 Physical Description...3 Chapter
Cisco Wireless Control System (WCS)
Data Sheet Cisco Wireless Control System (WCS) PRODUCT OVERVIEW Cisco Wireless Control System (WCS) Cisco Wireless Control System (WCS) is the industry s leading platform for wireless LAN planning, configuration,
ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0
ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0 Module 1: Vulnerabilities, Threats, and Attacks 1.1 Introduction to Network Security
Best Practices for Outdoor Wireless Security
Best Practices for Outdoor Wireless Security This paper describes security best practices for deploying an outdoor wireless LAN. This is standard body copy, style used is Body. Customers are encouraged
CISCO WIRELESS CONTROL SYSTEM (WCS)
CISCO WIRELESS CONTROL SYSTEM (WCS) Figure 1. Cisco Wireless Control System (WCS) PRODUCT OVERVIEW Cisco Wireless Control System (WCS) Cisco Wireless Control System (WCS) is the industry s leading platform
Management Software AT-WA7400/NA. User s Guide. 613-000486 Rev. B
Management Software AT-WA7400/NA User s Guide 613-000486 Rev. B Copyright 2007 Allied Telesynsyn, Inc. All rights reserved. No part of this publication may be reproduced without prior written permission
HP Networking Mobility Security IDS/IPS Series
HP Networking Mobility Security IDS/IPS Series Data sheet Product overview HP RF Manager provides detection and prevention of wireless threats with automated policy-based security and location-tracking
Ensuring HIPAA Compliance in Healthcare
White paper Ensuring HIPAA Compliance in Healthcare Overview Wireless LANs are prevalent in healthcare institutions. The constant need for mobility among doctors, nurses, and staff while remaining connected
Enterprise A Closer Look at Wireless Intrusion Detection:
White Paper Enterprise A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model Josh Wright Senior Security Researcher Introduction As wireless enterprise networks become
Case Study - Configuration between NXC2500 and LDAP Server
Case Study - Configuration between NXC2500 and LDAP Server 1 1. Scenario:... 3 2. Topology:... 4 3. Step-by-step Configurations:...4 a. Configure NXC2500:...4 b. Configure LDAP setting on NXC2500:...10
DESIGNING AND DEPLOYING SECURE WIRELESS LANS. Karl McDermott Cisco Systems Ireland [email protected]
DESIGNING AND DEPLOYING SECURE WIRELESS LANS Karl McDermott Cisco Systems Ireland [email protected] 1 Agenda Wireless LAN Security Overview WLAN Security Authentication and Encryption Radio Monitoring
Interlink Networks Secure.XS and Cisco Wireless Deployment Guide
Overview Interlink Networks Secure.XS and Cisco Wireless Deployment Guide (An AVVID certification required document) This document is intended to serve as a guideline to setup Interlink Networks Secure.XS
D-View 7 Network Management System
Product Highlights Comprehensive Management Manage your network effectively with useful tools and features such as Batch Configuration, SNMP, and Flexible command Line Dispatch Hassle-Free Network Management
Chapter 4 Management. Viewing the Activity Log
Chapter 4 Management This chapter describes how to use the management features of your NETGEAR WG102 ProSafe 802.11g Wireless Access Point. To get to these features, connect to the WG102 as described in
WiNG 5.x How-To Guide
WiNG 5.x How-To Guide Remote Debugging Part No. TME-02-2012-01 Rev. A MOTOROLA, MOTO, MOTOROLA SOLUTIONS and the Stylized M Logo are trademarks or registered trademarks of Motorola Trademark Holdings,
Implementing Security for Wireless Networks
Implementing Security for Wireless Networks Action Items for this session Learn something! Take notes! Fill out that evaluation. I love to see your comments and we want to make these better! Most important:
Lab 8.3.1.2 Configure Basic AP Security through IOS CLI
Lab 8.3.1.2 Configure Basic AP Security through IOS CLI Estimated Time: 30 minutes Number of Team Members: Students will work in teams of two. Objective In this lab, the student will learn the following
Trapeze Networks Mobility System Configuration and Deployment Guide
Trapeze Networks Mobility System Configuration and Deployment Guide SpectraLink s Voice Interoperability for Enterprise Wireless (VIEW) Certification Program is designed to ensure interoperability and
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security Objectives Overview of IEEE 802.11 wireless security Define vulnerabilities of Open System Authentication,
HP RF Manager Release 6.0.177
5998 3768 v6.0.177 HP RF Manager Release 6.0.177 Release Notes www.hp.com/networking Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without
CISCO IOS NETWORK SECURITY (IINS)
CISCO IOS NETWORK SECURITY (IINS) SEVENMENTOR TRAINING PVT.LTD [Type text] Exam Description The 640-553 Implementing Cisco IOS Network Security (IINS) exam is associated with the CCNA Security certification.
Chapter 3 Management. Remote Management
Chapter 3 Management This chapter describes how to use the management features of your ProSafe 802.11a/g Dual Band Wireless Access Point WAG102. To access these features, connect to the WAG102 as described
Wireless Robust Security Networks: Keeping the Bad Guys Out with 802.11i (WPA2)
Wireless Robust Security Networks: Keeping the Bad Guys Out with 802.11i (WPA2) SUNY Technology Conference June 21, 2011 Bill Kramp FLCC Network Administrator Copyright 2011 William D. Kramp All Rights
LevelOne WAP - 0005. User s Manual. 108 Mbps Wireless Access Point
LevelOne WAP - 0005 108 Mbps Wireless Access Point User s Manual TABLE OF CONTENTS CHAPTER 1 INTRODUCTION... 1 Features of your Wireless Access Point... 1 Package Contents... 3 Physical Details... 3 CHAPTER
L2+ Unified Wired/Wireless Gigabit PoE Switches
Scalable Unified Wired/Wireless Network Architecture Manages up to 48 D-Link Unified Access Points Up to 192 Unified Access Points can be managed by a cluster of four DWS-3160 switches Robust Wired/Wireless
White paper. Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points. http://www.veryxtech.com
White paper Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points http://www.veryxtech.com White Paper Abstract Background The vulnerabilities spotted in the Wired Equivalent Privacy (WEP) algorithm
BYOD: BRING YOUR OWN DEVICE.
white paper BYOD: BRING YOUR OWN DEVICE. On-boarding and Securing Devices in Your Corporate Network Preparing Your Network to Meet Device Demand The proliferation of smartphones and tablets brings increased
Link Layer and Network Layer Security for Wireless Networks
Link Layer and Network Layer Security for Wireless Networks Interlink Networks, Inc. May 15, 2003 1 LINK LAYER AND NETWORK LAYER SECURITY FOR WIRELESS NETWORKS... 3 Abstract... 3 1. INTRODUCTION... 3 2.
System 800xA Operations Operator Workplace Support for Mobile Devices
System 800xA Operations Operator Workplace Support for Mobile Devices System Version 6.0 Power and productivity for a better world TM System 800xA Operations Operator Workplace Support for Mobile Devices
Switch Configuration Required to Support Cisco ISE Functions
APPENDIXC Switch Configuration Required to Support Cisco ISE Functions To ensure Cisco ISE is able to interoperate with network switches and functions from Cisco ISE are successful across the network segment,
AT-TQ2450 Enterprise-class Wireless Access Point with IEEE802.11a/b/g/n Dual Radio. Management Software User s Guide. 613-001821 Rev.
AT-TQ2450 Enterprise-class Wireless Access Point with IEEE802.11a/b/g/n Dual Radio Management Software User s Guide 613-001821 Rev. A Copyright 2013 Allied Telesis, Inc. All rights reserved. This product
The All-in-One, Intelligent WLAN Controller
The All-in-One, Intelligent WLAN Controller Centralized management for up to 64* APs ZyMESH mitigates complex, inconvenient cabling Wi-Fi deployments Client steering enhances efficiency of wireless spectrum
Smart Business Architecture for Midsize Networks Network Management Deployment Guide
Smart Business Architecture for Midsize Networks Network Management Deployment Guide Introduction: Smart Business Architecture for Mid-sized Networks, Network Management Deployment Guide With the Smart
How To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
642 552 Securing Cisco Network Devices (SND)
642 552 Securing Cisco Network Devices (SND) Course Number: 642 552 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional, Cisco Firewall Specialist,
ProCurve Networking. Hardening ProCurve Switches. Technical White Paper
ProCurve Networking Hardening ProCurve Switches Technical White Paper Executive Summary and Purpose... 3 Insecure Protocols and Secure Alternatives... 3 Telnet vs. Secure Shell... 3 HTTP vs. HTTPS... 3
WiNG 5.X Reference. Best Practices & Recommendations. Part No. TME-03-2015-XX Rev. D
WiNG 5.X Reference Best Practices & Recommendations Part No. TME-03-2015-XX Rev. D 2015 ZIH Corp. All rights reserved. Zebra and the stylized Zebra head are trademarks of ZIH Corp., registered in many
ADSP Infrastructure Management Compliance Audit. How-To Guide
ADSP Infrastructure Management Compliance Audit How-To Guide Zebra and the Zebra head graphic are registered trademarks of ZIH Corp. The Symbol logo is a registered trademark of Symbol Technologies, Inc.,
