Motorola_Wireless IDS
Overview:
Threats to WLANs are
numerous and are potentially devastating to business and day to day operations.Security
issues ranging from unauthorized Access Points (APs) or 802.11 attacks can
plague a WLANand provide risk to sensitive information as well as impact
performance.To aid in the detection and defense of potential threats, Motorola
offers enterprises with a layered approach to security that includes integrated
unauthorized AP detection, unauthorized AP containment and Wireless Intrusion
Detection.
Pre-Requisites
- The following requirements must be met prior to
attempting this configuration:
- One or more RF Switches are installed and operational
on the network.
- One or more AP300 Access Ports configured and adopted
by the RF Switch.
- A Windows XP workstation with a console, telnet or SSH
client is available to perform configuration on the RF Switches.
- One or more standalone Access Points to verify
unauthorized AP detection and containment.
- One or more wireless workstations are available to test
and verify unauthorized AP containment and intrusion detection.
- The reader has read the Motorola RFS Series Wireless
LAN Switches - WiNG System Reference Guide.
Components Used:
The information in this
document is based on the following Motorola hardware and software versions:
- 1 x RFS6000 Version 3.3.
- 5 x AP300s.
Registered users may
download the latest software and firmware from the Motorola Technical
Support Site
http://support.symbol.com.
Configuration:
The following sections
outline the configuration steps required to enable unauthorized AP detection
and intrusion detection on an RF Switch:
1) Unauthorized AP
Detection
2) Unauthorized AP
Containment
3) Mobile Unit
Intrusion Detection
4) SNMP Traps
Unauthorized AP
Detection:
As shown in figure 3.1,
an RF Switch is deployed at a site with four AP300s. The administrator wants to
enable unauthorized AP detection to be proactively alerted when any APs are
added or removed from the site.
To provide unauthorized
detection, three AP300s will be configured to perform single channel scanning while
providing WLAN services to users. The three APs will monitor the 2.4GHz
channels 1, 6 and 11 and 5GHz channels 36, 40 & 48. The fourth AP300 will
be configured as a dedicated detector AP and will monitor all channels within
the regulatory domain. Using three AP300s with single channel scanning and
a dedicated detector APs
will provide the RF Switch with complete visibility into the 2.4GHz and 5GH z spectrum
at this site.
Web UI Configuration
Example.
The following configuration
example will demonstrate how to globally enable unauthorized AP detection on
an RF Switch and configure AP300 scanning options using the Web UI:
1) In the menu
tree select Network > Access Port Radios then select the Configuration tab.
Highlight and select an AP300
radio then click Edit.
In the Network >
Access Port Radio > Configuration window under Properties, check the option Single-channel
scan for Unapproved APs or Dedicate this AP as a Detector AP. In this
example radios 1-4 & 7-8 will be configured for single channel
scanning and radios 5-6 will be configured as dedicated detectors.
In the menu tree select
Security > Access Point Detection then select the Configuration tab. Check
the Enable to globally enable unauthorized AP detection on the switch then
click Apply.
If Motorola devices are
being deployed, you may optionally enable MU Assisted Scanning which leverages
Motorola client extensions on Motorola devices to provide additional
detection.
In the menu tree select
Security > Access Point Detection then select the Unapproved APs (AP Reported)
tab. All detected APs will be listed in this table.
Click Save to apply and save changes
Mobile Unit Intrusion
Detection:
To provide proactive
protection against active intrusion attempts, mobile unit intrusion detection will
be enabled on the RF Switch. The RF Switch can detect numerous intrusion
violations and can alert administrators of intrusion attempts and attacks
as well as provide mitigation by automatically blacklisting mobile units
triggering the violation.
In this example the
following configuration will be performed:
1) The global
detection window will be increased from 10 seconds to 60 seconds.
2) The MU
Excessive Authentication Failure threshold will be set to 10. If 10
authentication failures occur from a specific MU within a 60 second
window, an alarm will be generated and the MU blacklisted.
3) The Radio and
Switch Excessive Authentication Failure thresholds will be set to 20. If
20 authentication failures occur on a single radio or globally on the RF
Switch the within a 60 second window, an alarm will be generated.
4) The Time to
Filter for the Excessive Authentication Failure intrusion violation will be set
to 300 seconds. If an MU triggers the intrusion violation, the MUs MAC
address will be filtered for 5 minutes.
Web UI Configuration
Example:
The following
configuration example will demonstrate how to enable mobile unit intrusion
detection for excessive authentication failures using the Web UI:
1) In the menu
tree select Security > Mobile Unit Intrusion Detection then select the
Configuration tab. In the Detection Window field specify the detection window
interval (in seconds) the RF Switch will use to scan for violations. In
this example a 60 second detection window will be configured. Click Apply.
In the Violation
Parameters table, locate Excessive Authentication failure then enter a
threshold value in the Mobile Unit, Radio and Switch fields. Additionally
in the Time to Filter field enter a value (in seconds) that the mobile
unit will be blacklisted when violations occur. In this example the Mobile
Unit threshold will be set to 10 and the Radio and Switch thresholds set to 20.
Additionally the Time to Filter violating MUs will be set to 300. Click
Apply
Select the Filtered MUs tab. Any mobile units that have violated an event will be listed in the table.
Click Save to apply and save changes.
SNMP Traps:
To provide proactive
alerting of unauthorized APs and intrusion events, an RFMS 3.0 server will
be defined on the RF Switch as an SNMP trap receiver and unauthorized AP
and intrusion detection traps enabled. When the RF Switch detects an unauthorized
AP or a intrusion detection violation, the RF Switch will forward an SNMP
trap to the RFMS server
Web UI Configuration
Example:
The following
configuration example will demonstrate how to enable SNMP traps to an RFMS 3.0
server for unauthorized APs and mobile unit intrusion detection violations
using the Web UI:
1) In the menu
tree select Management Access > SNMP Trap Receivers then click Add
In the Management Access > SNMP Traps window, enter the IP Address of the RFMS 3.0 server.
Under Protocol Options select the SNMP version then click OK.
In the menu tree
select Management Access > SNMP Trap Configuration then select theConfiguration
tab. In the All Traps tree, locate AP Detection then select the Unapproved AP detected
and Unapproved AP removed traps. Click Enable Trap
Click Apply.
In the menu tree select
Management Access > SNMP Trap Configuration then select the Configuration
tab. In the All Traps tree, locate Intrusion Detection then select the
Excessive violation from mobile unit, Excessive violation from radio and
Excessive violation from switch traps. Click Enable Trap.
Click Apply.
In the menu tree select
Management Access > SNMP Trap Configuration. Check the option Allow Traps to
be generated then click Apply
RF Switch Running Configuration:
The following shows the running configuration of the RFS6000 switch used to create this guide:
RFS6000# show running-config
0 nhận xét:
Post a Comment