Ads 468x60px

Motorola_Wireless IDS

Overview:

Threats to WLANs are numerous and are potentially devastating to business and day to day operations.Security issues ranging from unauthorized Access Points (APs) or 802.11 attacks can plague a WLANand provide risk to sensitive information as well as impact performance.To aid in the detection and defense of potential threats, Motorola offers enterprises with a layered approach to security that includes integrated unauthorized AP detection, unauthorized AP containment and Wireless Intrusion Detection.

Pre-Requisites
  • The following requirements must be met prior to attempting this configuration:
  • One or more RF Switches are installed and operational on the network.
  • One or more AP300 Access Ports configured and adopted by the RF Switch.
  • A Windows XP workstation with a console, telnet or SSH client is available to perform configuration on the RF Switches.
  • One or more standalone Access Points to verify unauthorized AP detection and containment.
  • One or more wireless workstations are available to test and verify unauthorized AP containment and intrusion detection.
  • The reader has read the Motorola RFS Series Wireless LAN Switches - WiNG System Reference Guide.
Components Used:
The information in this document is based on the following Motorola hardware and software versions:
  • 1 x RFS6000 Version 3.3.
  • 5 x AP300s.
Registered users may download the latest software and firmware from the Motorola Technical
Support Site http://support.symbol.com.

Configuration:
The following sections outline the configuration steps required to enable unauthorized AP detection and intrusion detection on an RF Switch:
1)  Unauthorized AP Detection
2)  Unauthorized AP Containment
3)  Mobile Unit Intrusion Detection
4)  SNMP Traps

Unauthorized AP Detection:

As shown in figure 3.1, an RF Switch is deployed at a site with four AP300s. The administrator wants to enable unauthorized AP detection to be proactively alerted when any APs are added or removed from the site.
To provide unauthorized detection, three AP300s will be configured to perform single channel scanning while providing WLAN services to users. The three APs will monitor the 2.4GHz channels 1, 6 and 11 and 5GHz channels 36, 40 & 48. The fourth AP300 will be configured as a dedicated detector AP and will monitor all channels within the regulatory domain. Using three AP300s with single channel scanning and

a dedicated detector APs will provide the RF Switch with complete visibility into the 2.4GHz and 5GH z spectrum at this site.

Web UI Configuration Example.
The following configuration example will demonstrate how to globally enable unauthorized AP detection on an RF Switch and configure AP300 scanning options using the Web UI:
1)  In the menu tree select Network > Access Port Radios then select the Configuration tab. Highlight and select an AP300 radio then click Edit.


In the Network > Access Port Radio > Configuration window under Properties, check the option Single-channel scan for Unapproved APs or Dedicate this AP as a Detector AP. In this example radios 1-4 & 7-8 will be configured for single channel scanning and radios 5-6 will be configured as dedicated detectors.

In the menu tree select Security > Access Point Detection then select the Configuration tab. Check the Enable to globally enable unauthorized AP detection on the switch then click Apply. 
If Motorola devices are being deployed, you may optionally enable MU Assisted Scanning which leverages Motorola client extensions on Motorola  devices to provide additional detection.
In the menu tree select Security > Access Point Detection then select the Unapproved APs (AP Reported) tab. All detected APs will be listed in this table.


Click Save to apply and save changes

Mobile Unit Intrusion Detection:

To provide proactive protection against active intrusion attempts, mobile unit intrusion detection will be enabled on the RF Switch. The RF Switch can detect numerous intrusion violations and can alert administrators of intrusion attempts and attacks as well as provide mitigation by automatically blacklisting mobile units triggering the violation.
In this example the following configuration will be performed:
1)  The global detection window will be increased from 10 seconds to 60 seconds. 
2)  The MU Excessive Authentication Failure threshold will be set to 10. If 10 authentication failures occur from a specific MU within a 60 second window, an alarm will be generated and the MU blacklisted.
3)  The Radio and Switch Excessive Authentication Failure thresholds will be set to 20. If 20 authentication failures occur on a single radio or globally on the RF Switch the within a 60 second window, an alarm will be generated.
4)  The Time to Filter for the Excessive Authentication Failure intrusion violation will be set to 300 seconds. If an MU triggers the intrusion violation, the MUs MAC address will be filtered for 5 minutes.


Web UI Configuration Example:
The following configuration example will demonstrate how to enable mobile unit intrusion detection for excessive authentication failures using the Web UI:
1)  In the menu tree select Security > Mobile Unit Intrusion Detection then select the Configuration tab. In the Detection Window field specify the detection window interval (in seconds) the RF Switch will use to scan for violations. In this example a 60 second detection window will be configured. Click Apply.


In the Violation Parameters table, locate Excessive Authentication failure then enter a threshold value in the Mobile Unit, Radio and Switch fields. Additionally in the Time to Filter field enter a value (in seconds) that the mobile unit will be blacklisted when violations occur. In this example the Mobile Unit threshold will be set to 10 and the Radio and Switch thresholds set to 20. Additionally the  Time to Filter violating MUs will be set to 300. Click Apply


 Select the Filtered MUs tab. Any mobile units that have violated an event will be listed in the table.

Click Save to apply and save changes.

SNMP Traps:
To provide proactive alerting of unauthorized APs and intrusion events, an RFMS 3.0 server will be defined on the RF Switch as an SNMP trap receiver and unauthorized AP and intrusion detection traps enabled. When the RF Switch detects an unauthorized AP or a intrusion detection violation, the RF Switch will forward an SNMP trap to the RFMS server



Web UI Configuration Example:
The following configuration example will demonstrate how to enable SNMP traps to an RFMS 3.0 server for unauthorized APs and mobile unit intrusion detection violations using the Web UI:
1)  In the menu tree select Management Access > SNMP Trap Receivers then click Add

In the Management Access > SNMP Traps window, enter the IP Address of the RFMS 3.0 server. 
Under Protocol Options select the SNMP version then click OK.

 In the menu tree select Management Access > SNMP Trap Configuration then select theConfiguration tab. In the All Traps tree, locate AP Detection then select the Unapproved AP detected and Unapproved AP removed traps. Click Enable Trap



Click Apply.



In the menu tree select Management Access > SNMP Trap Configuration then select the Configuration tab. In the All Traps tree, locate Intrusion Detection then select the Excessive violation from mobile unit, Excessive violation from radio and Excessive violation from switch traps. Click Enable Trap.




Click Apply.


In the menu tree select Management Access > SNMP Trap Configuration. Check the option Allow Traps to be generated then click Apply




RF Switch Running Configuration:
The following shows the running configuration of the RFS6000 switch used to create this guide:
RFS6000# show running-config

0 nhận xét:

Post a Comment