Wireless/Redundant Edge Services xl Module Management and Configuration Guide WS.02.xx and greater

Table Of Contents
13-57
Wireless Network Management
Configuring Station Intrusion Detection
Configuring Station Intrusion Detection
AP detection protects your network against unauthorized APs. The Wireless
Edge Services xl Module can also guard against hackers who use stations to
launch attacks. Using station intrusion detection, the module monitors sta-
tions for suspicious behavior that might indicate an attack such as the follow-
ing:
Reconnaissance attack—An attacker sends probes to discover APs and
the stations that are associating with those APs. Using the information
discovered, the attacker can launch additional attacks.
Association flood attack—An attacker spoofs multiple clients, sending
so many association requests that the AP cannot handle them all. The AP
begins to deny additional associations.
Disassociation flood attackAfter launching a reconnaissance attack,
the attacker identifies the stations attached to a particular AP. The
attacker then masquerades as the AP and sends disassociation frames to
the stations. Although the stations quickly re-associate with the AP, the
attacker continues to send disassociation frames to end the stations’
sessions.
Authentication failure attack—The attacker uses a tool to masquerade
as an AP. When a station submits its login credentials, the attacker sends
an authentication failed message to the station. The station then removes
itself from the WLAN. An attacker may also launch this attack by spoofing
a station, sending invalid login credentials. The AP then denies the station
access to the WLAN.
802.11 replay attackThe attacker captures and resends legitimate
frames. This attack can be used to overwhelm the network, spoof a
legitimate user, or learn additional information about the network.
Decryption attack—If an attacker is trying to crack the encryption used
on your WLAN, your AP will receive a high number of encryption failures.
EAP start frame attack—An attacker floods the AP with EAP start
frames, causing the AP to allocate resources for each session. Eventually,
the attack consumes all of the AP’s resources, creating a DoS.
TKIP attack—An attacker tries to alter a frame and bypass the Michael
integrity check. TKIP is designed to take countermeasures against such
attacks, such as closing the session or refreshing the master key.
When a station exhibits a potentially harmful behavior, the Wireless Edge
Services xl Module filters all traffic from the station for a certain period.