Configuring IDS Parameters on APs

Aruba Central supports the IDSIntrusion Detection System. IDS monitors a network or systems for malicious activity or policy violations and reports its findings to the management system deployed in the network. feature that monitors the network for the presence of unauthorized access points (APs). It also logs information about the unauthorized APs and clients, and generates reports based on the logged information.

Rogue APs

The IDS feature in the Aruba Central network enables you to detect rogue APs, interfering APs, and other devices that can potentially disrupt network operations. A rogue AP is an unauthorized AP plugged into the wired side of the network. An interfering AP is an AP seen in the RFRadio Frequency. RF refers to the electromagnetic wave frequencies within a range of 3 kHz to 300 GHz, including the frequencies used for communications or Radar signals. environment, but it is not connected to the wired network. While the interfering AP can potentially cause RF interference, it is not considered a direct security threat, because it is not connected to the wired network. However, an interfering AP may be reclassified as a rogue AP.

The built-in IDS scans for APs that are not controlled by the VC. These are listed and classified as either Interfering or Rogue, depending on whether they are on a foreign network or your network.

Configuring Wireless Intrusion Detection and Protection Policies

To configure a Wireless Intrusion Detection and Protection policy:

  1. In the Network Operations app, set the filter to a group that contains at least one AP.
  2. The dashboard context for the group is displayed.
  3. Under Manage, click Devices > Access Points.
  4. Click the Config icon. The tabs to configure access points is displayed.
  5. Click Show Advanced.
  6. Click Security. The Security details page is displayed.
  7. Click the Wireless IDS/IPS accordion. The following three sections are displayed:
    • Detection
    • Protection
    • Firewall Settings

You can configure the following options in the above mentioned sections:

  • Infrastructure Detection Policies—Specifies the policy for detecting wireless attacks on APs.
  • Client Detection Policies—Specifies the policy for detecting wireless attacks on clients.
  • Infrastructure Protection Policies—Specifies the policy for protecting APs from wireless attacks.
  • Client Protection Policies—Specifies the policy for protecting clients from wireless attacks.
  • Firewall Policies—Specifies the policies to set a firewallFirewall is a network security system used for preventing unauthorized access to or from a private network. for a secured network access.
  • Containment Methods—Prevents unauthorized stations from connecting to your Aruba Central network.

Each of these options contains several default levels that enable different sets of policies. An administrator can customize enable or disable these options accordingly.

Detection

The detection levels can be configured using the Detection section. The following levels of detection can be configured in the WIPWireless Intrusion Protection. The WIP module provides wired and wireless AP detection, classification, and containment. It detects Denial of Service (DoS) and impersonation attacks, and prevents client and network intrusions. Detection page:

  • High
  • Medium
  • Low
  • Off
  • Custom

The following table describes the detection policies enabled in the Infrastructure Detection field.

Table 1: Infrastructure Detection Policies

Detection level

Detection policy

Off

All detection policies are disabled.

Low

  • Detect Windows Bridge—Enables detection of Windows station bridging.
  • Signature Deassociation Broadcast—Configures signature matching for the deassociation broadcast frame type.
  • Signature Deauthentication Broadcast—Configures signature matching for the deauthentication broadcast frame type.
  • Detect AP Spoofing—Enables AP Spoofing detection.

Medium

  • Detect Windows Bridge—Enables detection of Windows station bridging.
  • Signature Deassociation Broadcast—Configures signature matching for the deassociation broadcast frame type.
  • Signature Deauthentication Broadcast—Configures signature matching for the deauthentication broadcast frame type.
  • Detect AP Spoofing—Enables AP Spoofing detection.
  • Detect adhoc using VALID SSID—Enables detection of adhoc networks.
  • Detect malformed large duration—Enables detection of unusually large durations in frames.

High

Custom

Allows you to select custom detection policies. To select, click the check box of respective detection policy.

The following table describes the detection policies enabled in the Client Detection field.

Table 2: Client Detection Policies

Detection level

Detection policy

Off

All detection policies are disabled.

Low

Detect Valid Client Misassociation—Enables detection of misassociation between a valid client and an unsafe AP. This setting can detect the following misassociation types:

  • Misassociation to rogue AP
  • Misassociation to external AP
  • Misassociation to honeypot AP
  • Misassociation to adhoc AP
  • Misassociation to Hosted AP

Medium

High

  • Detect Valid Client Misassociation—Enables detection of misassociation between a valid client and an unsafe AP. This setting can detect the following misassociation types:
    • Misassociation to rogue AP
    • Misassociation to external AP
    • Misassociation to honeypot AP
    • Misassociation to adhoc AP
    • Misassociation to Hosted AP
  • Detect Hotspotter Attack—Enables detection of hotspot attacks.
  • Detect Power Save DOS Attack—Enables detection of Power Save DoS attack.
  • Detect Omerta Attack—Enables detection of Omerta attack.
  • Detect Disconnect Station—Enables a station disconnection attack. In a station disconnection, attacker spoofs the MAC address of either an active client or an active AP. The attacker then sends deauthenticate frames to the target device, causing it to lose its active association.
  • Detect unencrypted Valid —Enables detection of unencrypted valid clients.
  • Detect Block ACK Attack—Enables detection of attempts to reset traffic receive windows using the forged Block ACK Add messages.
  • Detect FATA-Jack—Enables detection of fatjack attacks.

Custom

Allows you to select custom detection policies. To select, click the check box of respective detection policy.

Protection

The following levels of detection can be configured in the WIP Protection page:

  • Off
  • Low
  • High
  • Custom

The following table describes the protection policies that are enabled in the Infrastructure Protection field.

Table 3: Infrastructure Protection Policies

Protection level

Protection policy

Off

All protection policies are disabled

Low

  • Protect SSID—Enforces policy where the valid/protected SSIDs are used only by valid APs. An offending AP is contained by preventing clients from associating to it.
  • Rogue Containment—Controls Rogue APs. When rogue APs are detected, they are not automatically disabled. This option automatically disables a rogue AP by preventing clients from associating to it.

High

  • Protect SSID—Enforces policy where the valid/protected SSIDs are used only by valid APs. An offending AP is contained by preventing clients from associating to it.
  • Rogue Containment—Controls Rogue APs. When rogue APs are detected, they are not automatically disabled. This option automatically disables a rogue AP by preventing clients from associating to it.
  • Protect AP Impersonation—Enables protection from AP impersonation attacks. When AP impersonation is detected, both the legitimate and impersonating AP are disabled using a Denial of Service (DoS).
  • Protect from Adhoc Networks—Enables protection from adhoc networks. When adhoc networks are detected, they are disabled using a denial of service attack.

Custom

Allows you to select custom detection policies. To select, click the check box of respective protection policy.

The following table describes the detection policies that are enabled in the Client Protection field.

Table 4: Client Protection Policies

Protection level

Protection policy

Off

All protection policies are disabled

Low

Protect Valid Station—Enables protection of valid stations. When enabled valid stations are not allowed to connect to an invalid AP.

High

  • Protect Valid Station—Enables protection of valid stations. When enabled valid stations are not allowed to connect to an invalid AP.
  • Protect Windows Bridge—Enables protection of a Windows station bridging.

Custom

Allows you to select custom detection policies. To select, click the check box of respective protection policy.

Containment Methods

You can enable wired and wireless containment measures to prevent unauthorized stations from connecting to your Aruba Central network.

Aruba Central supports the following types of containment mechanisms:

  • Wired containment — When enabled, APs generate ARPAddress Resolution Protocol. ARP is used for mapping IP network address to the hardware MAC address of a device. packets on the wired network to contain wireless attacks.
  • Wireless containment — When enabled, the system attempts to disconnect all clients that are connected or attempting to connect to the identified AP.

    • None — Disables all the containment mechanisms.
    • Deauthenticate only — With deauthentication containment, the AP or client is contained by disrupting the client association on the wireless interface.
    • Tarpit containment — With tarpit containment, the AP is contained by luring clients that are attempting to associate with it to a tarpit. The tarpit can be on the same channel or a different channel as the AP being contained.
    • Tarpit all stations—Enables wireless containment by tarpit for all stations.

The FCCFederal Communications Commission. FCC is a regulatory body that defines standards for the interstate and international communications by radio, television, wire, satellite, and cable. and some third parties have alleged that under certain circumstances, the use of containment functionality violates 47 U.S.C. §333. Before using any containment functionality, ensure that your intended use is allowed under the applicable rules, regulations, and policies. Aruba is not liable for any claims, sanctions, or other direct, indirect, special, consequential or incidental damages related to your use of containment functionality.

Protection Against Wired Attacks

In the Protection Against Wired Attacks section, enable the following options:

Firewall Settings

To configure firewall settings by specifying the policies for a secured network access, see Enabling ALG Protocols on IAPs and Configuring Firewall Parameters for Wireless Network Protection.