Personal network often requried WPA2 - PSK to secure their network.
But Enterprise network managers too often assume strong encryption equals strong security for wireless LAN (WLAN) traffic
Certainly, WPA2 Enterprise offers better authentication and encryption options than many organizations deploy in their wired networks. But WLANs involve many other potential vulnerabilities: Rogue access points (APs); denial-of-service attacks against clients; and targeted attacks against WLAN infrastructure all can lead to leakage of sensitive data. The threat to enterprise WLANs is real and growing
Some of them features required in the real word from these attacks,
1. Rogue AP Detection & Rogue Containment
A rogue access point is an AP not sanctioned or authorized by network administrators. Typically, rogue APs are connected to a network by well-intentioned employees unaware of the security risks they cause. Enhanced security monitoring enables faster response to these security breaches by performing the Security functions.
Once a rogue AP has been detected and classified, Dedicated air monitors provide a more effective way to perform rogue AP containment without negatively impacting the performance of the wireless network.
2. Protecting Wireless Client
Valid Client on Unencrypted SSID
Valid Client on Rogue AP With Valid SSID
Penetration Attacks Against Valid Clients
Disconnect Station Attacks
Client Flooding Attacks
Block ACK Attacks
3. Protecting Wireless Infrastructure
Deauthentication and Disassociation Broadcast Attacks
Frame Rate Anomaly Attacks
Malformed Frame Attacks
Dedicated AMs or Sensors, Wireless Controller Combined with Wired NMS System provide a number of security-related enhancements over others.
But Enterprise network managers too often assume strong encryption equals strong security for wireless LAN (WLAN) traffic
Certainly, WPA2 Enterprise offers better authentication and encryption options than many organizations deploy in their wired networks. But WLANs involve many other potential vulnerabilities: Rogue access points (APs); denial-of-service attacks against clients; and targeted attacks against WLAN infrastructure all can lead to leakage of sensitive data. The threat to enterprise WLANs is real and growing
Some of them features required in the real word from these attacks,
1. Rogue AP Detection & Rogue Containment
A rogue access point is an AP not sanctioned or authorized by network administrators. Typically, rogue APs are connected to a network by well-intentioned employees unaware of the security risks they cause. Enhanced security monitoring enables faster response to these security breaches by performing the Security functions.
Once a rogue AP has been detected and classified, Dedicated air monitors provide a more effective way to perform rogue AP containment without negatively impacting the performance of the wireless network.
2. Protecting Wireless Client
Valid Client on Unencrypted SSID
Valid Client on Rogue AP With Valid SSID
Penetration Attacks Against Valid Clients
Disconnect Station Attacks
Client Flooding Attacks
Block ACK Attacks
3. Protecting Wireless Infrastructure
Deauthentication and Disassociation Broadcast Attacks
Frame Rate Anomaly Attacks
Malformed Frame Attacks
Dedicated AMs or Sensors, Wireless Controller Combined with Wired NMS System provide a number of security-related enhancements over others.
No comments:
Post a Comment