WLAN Configuration Guide

HomeSupportWirelessH3C WA2200 Series WLAN Access PointsConfigure & DeployConfiguration GuidesH3C WA Series WLAN Access Points Configuration Guide-6W100WLAN Configuration Guide
05-WLAN IDS Configuration
Title Size Download
05-WLAN IDS Configuration 102.62 KB

l          The models listed in this document are not applicable to all regions. Please consult your local sales office for the models applicable to your region.

l          Support of the H3C WA series WLAN access points (APs) for features may vary by AP model. For more information, see Feature Matrix.

l          The interface types and the number of interfaces vary by AP model.

l          The radio types supported by the H3C WA series WLAN access points vary by AP model.

l          The term AP in this document refers to common APs, wireless bridges, or mesh APs.

 

WLAN IDS Configuration

This chapter includes these sections:

l          WLAN IDS Overview

l          Configuring IDS Attack Detection

l          Displaying and Maintaining WLAN IDS

l          Frame Filtering

l          Configuring WIDS-Frame Filtering

l          Displaying and Maintaining WLAN IDS Frame Filtering

l          WLAN IDS Frame Filtering Configuration Example

WLAN IDS Overview

802.11 networks are susceptible to a wide array of threats such as unauthorized access points and clients, ad-hoc networks, Denial of Service (DoS) attacks. Rogue devices are a serious threat to enterprise security. WLAN intrusion detection system (IDS) is used for the early detection of malicious attacks and intrusions on a wireless network. WLAN IPS helps to protect enterprise networks and users from unauthorized wireless access.

Terminology

l          WLAN intrusion detection system: WLAN IDS is designed to be deployed in an area that an existing wireless network covers. It aids in the early detection of malicious outsider attacks and intrusions via the wireless network.

l          Rogue AP: An unauthorized or malicious access point on the network, such as an employee setup AP, misconfigured AP, neighbor AP or an attacker operated AP. As it is not authorized, if there is any vulnerability in the AP, the hacker will have chance to compromise your network security.

l          Rogue STA: An unauthorized or malicious station on the network.

l          Ad-hoc mode: A station in ad-hoc mode can directly communicate with other stations without support from any other device.

WLAN IDS IPS

WLAN IDS IPS is a sub-feature of WLAN IDS. WLAN IDS IPS supports detection of the following attacks:

l          Flood attack

l          Weak IV attack

l          Spoofing attack

WLAN IDS IPS detects intrusions or attacks on the WLAN system, and DoS attacks.

Flood attack detection

When a device tries to flood a network, it sends large volumes of frames of the same kind within a short span of time. When this occurs, the Access Controller (AC) and the Access Points (APs) are overwhelmed with frames from this device and consequently, frames from authorized stations get dropped.

WLAN IDS IPS counters this flood attack by constantly keeping track of the density of traffic generated by each device. When this density exceeds the tolerance limit, the device is reported to be flooding the network and will be blocked. Subsequent frames from this device will not be processed. If the dynamic blacklist feature is enabled, the detected device is added to the dynamic blacklist. WLAN IDS IPS detects flood attacks for the following types of frames: authentication requests, deauthentication requests, association requests, disassociation requests, reassociation requests, probe requests, null data frames, and action frames.

When an AP supports multiple BSSIDs, stations send probe request frames to the individual BSSIDs. Therefore, to track the density of probe request frames, both the source and destination addresses are considered. For other frame types, only the source address is considered.

Weak IV detection

Wired Equivalent Privacy (WEP) is a protocol used for encrypting frames in a WLAN. WEP is based on a shared secret key and a pseudo-randomly generated 3-byte sequence called Initialization Vector (IV). When a WEP frame is sent, the IV used in encrypting the frame is also sent as part of the frame header.

However, sending some classes of IVs can ultimately reveal the shared secret key to any potential attackers. When the shared secret key is compromised, the attacker can access network resources.

WLAN IDS IPS counters this attack by verifying the IVs in WEP frames. Whenever a frame with a weak IV is detected, the attack is immediately logged.

Spoofing attack detection

In this kind of attack, a potential attacker can send a frame in the air on behalf of another device. For instance, a spoofed deauthentication frame can cause a station to get deauthenticated from the network.

WLAN IDS IPS counters this attack by detecting broadcast deauthentication and disassociation frames. When such a frame is received, this is identified as a spoofed frame, and the attack is immediately logged.

Configuring IDS Attack Detection

Configuring IDS Attack Detection

Follow these steps to configure IDS attack detection:

To do…

Use the command…

Remarks

Enter system view

system-view

Enter IDS view

wlan ids

Enable IDS attack detection

attack-detection enable { all | flood | weak-iv | spoof }

Required

Disabled by default.

 

Displaying and Maintaining WLAN IDS

To do…

Use the command…

Remarks

Display the history of attacks detected in the WLAN system

display wlan ids history

Available in any view

Display the statistics of attacks detected in the WLAN system

display wlan ids statistics

Available in any view

Clear the history of attacks detected in the WLAN system

reset wlan ids history

Available in user view

Clear the statistics of attacks detected in the WLAN system

reset wlan ids statistics

Available in user view

 

Frame Filtering

Frame filtering is a feature of 802.11 MAC and a sub-feature of WLAN IDS.

A fat AP maintains a white list (Entries in the list will be permitted and can be configured through CLI), static black list (Entries in the list will be denied and can be configured through CLI) and dynamic black list (Entries in the list will be denied and are added when WLAN IDS detects flood attacks).

Overview

Blacklist and white list

You can configure the blacklist and white list functions to filter frames from WLAN clients and thereby implement client access control.

WLAN client access control is accomplished through the following three types of lists.

l          White list: Contains the MAC addresses of all clients allowed to access the WLAN. If the white list is used, only permitted clients can access the WLAN, and all frames from other clients will be discarded.

l          Static blacklist: Contains the MAC addresses of clients forbidden to access the WLAN. This list is manually configured.

l          Dynamic blacklist: Contains the MAC addresses of clients forbidden to access the WLAN. A client is dynamically added to the list if it is considered sending attacking frames until the timer of the entry expires.

When an AP receives an 802.11 frame, it checks the source MAC address of the frame and processes the frame as follows:

1)        If the source MAC address does not match any entry in the white list, the frame is dropped. If there is a match, the frame is considered valid and will be further processed.

2)        If no white list entries exist, the static and dynamic blacklists are searched.

3)        If the source MAC address matches an entry in any of the two lists, the frame is dropped.

4)        If there is no match, or no blacklist entries exist, the frame is considered valid and will be further processed.

Figure 1-1 Frame filtering

 

If client 1 is present in the backlist, it cannot associate with the fat AP; if it is only in the white list, it can get associated with the fat AP.

Configuring WIDS-Frame Filtering

WLAN IDS frame filtering configuration involves white list, black list configuration and dynamic black list feature configuration.

l          In WLAN IDS view, you can configure the static black list, white list, enable dynamic blacklist feature and configure the lifetime for dynamic entries.

l          Only entries present in the white list will be permitted. You can add entries into or delete entries from the list.

l          Entries present in the static blacklist will be denied.

l          Whenever WLAN IDS detects a flood attack, the attacking device is added into the dynamic blacklist. You can set a lifetime in seconds for dynamic blacklist entries. After the lifetime of an entry expires, the device entry will be removed from the dynamic list.

Configuring Static White and Black Lists

Follow these steps to configure static white and black lists:

To do…

Use the command…

Remarks

Enter system view

system-view

Enter WLAN IDS view

wlan ids

Add an entry into the white list

whitelist mac-address mac-address

Optional

Add an entry into the static black list

static-blacklist mac-address mac-address

Optional

 

Configuring Dynamic Blacklist Feature

Follow these steps to configure dynamic blacklist feature:

To do…

Use the command…

Remarks

Enter system view

system-view

Enter WLAN IDS view

wlan ids

Enable the dynamic black list feature

dynamic-blacklist enable

Optional

By default, the dynamic blacklist feature is disabled.

Configure the lifetime for dynamic blacklist entries

dynamic-blacklist lifetime lifetime

Optional

By default, the lifetime is 300 seconds.

 

Displaying and Maintaining WLAN IDS Frame Filtering

To do…

Use the command…

Remarks

Display static or dynamic blacklist entries

display wlan

blacklist { static | dynamic }

Available in any view

Display white list entries

display wlan whitelist

Available in any view

Clear dynamic black list entries

reset wlan dynamic-blacklist { mac-address mac-address | all }

Available in user view

 

WLAN IDS Frame Filtering Configuration Example

Network requirements

l          As shown in Figure 1-2, a fat AP is connected to a Layer 2 switch. Client 1 (0000-000f-1211) is a rogue client. To ensure WLAN security, add the MAC address of the client into the blacklist on the fat AP to disable it from accessing the wireless network through any AP.

Figure 1-2 WLAN IDS frame filtering configuration

 

Configuration procedure

# Add MAC address 0000-000f-1211 of Client 1 into the blacklist.

<AP> system-view

[AP] wlan ids

[AP-wlan-ids] static-blacklist mac-address 0000-000f-1211

After the above configuration, Client 1 cannot access the AP, and other clients can access the network.


  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Intelligent Storage
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
  • Technical Blogs
All Support
  • Become A Partner
  • Partner Policy & Program
  • Global Learning
  • Partner Sales Resources
  • Partner Business Management
  • Service Business
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网