Security Basics mailing list archives

Re: jamming or blocking WLAN


From: oscarb () halock com
Date: Tue, 19 Aug 2008 08:47:34 -0600

Hi Adam,

This will depend on how the whole wireless infrastructure fits in your network, and what levels of control you have on 
all devices (e.g., AP, client WNIC, client OS).

Some of the things that you will need to look for in your wireless infrastructure:
1. Vendor / Model of AP - as this device will have the most impact in terms of securing your WLAN. Some devices have 
the capability of doing a rouge AP device and location tracking (e.g. Cisco's soln: 
http://www.cisco.com/en/US/prod/collateral/wireless/ps5678/ps6521/prod_white_paper0900aecd8042e23b_ns386_Networking_Solutions_White_Paper.html
 - Five Steps to Securing Your Wireless LAN and Preventing Wireless Threats)

2. Vendor / Model of client's WNIC - as this device will be connecting to your WAP. Administrative capability to lock 
down a client WNIC to only allowed WLAN connections (e.g. enterprise controlled WLAN associations). 

3. Control over the client devices - are they part of a controlled domain (e.g. Windows Domain). As this will give you 
some degree of control for WLAN associations.

4. Client based end-point security - to deter end-users from connecting to a non-authorized WLAN

5. Wireless Network Use Policy and End-user security Awareness Training

Thank you,
Oscar Bravo
Halock Security Labs


Current thread: