Data Loading...
Wireless LAN Security, Policy and Deployment Best Practices Flipbook PDF
Session ID 20PT Wireless LAN Security, Policy and Deployment Best Practices •BRKEWN-2021 •Israel Gonzalez, Security Solu
328 Views
75 Downloads
FLIP PDF 3.44MB
Wireless LAN Security, Policy and Deployment Best Practices • BRKEWN-2021 • Israel Gonzalez, Security Solutions Architect • CCIE#15732 Session ID 20PT
Agenda Security Standards
• Strong Encryption • Strong Authentication
User-Policy and Device Identification
• Wireless Policy Using ACS and ISE • Per User VLAN, ACL and QoS • Device Fingerprinting
Rogue Management, • Rogue Classification and Containment Attack Detection and • Adaptive wIPS Monitor Mode and ELM Threat Mitigation • MFP and Wired IPS Integration
Strong Authentication and Encryption
Authentication Evolution
MAC Address Authentication
WEP
802.1x / Dynamic WEP
WPA/WPA2
WPA/WPA2 Breakdown WPA
WPA2 Authentication Mechanisms
• A Snapshot of the 802.11i Standard • Commonly Used with TKIP Encryption • Final Version of 802.11i • Commonly Used with AES Encryption
• Personal (PSK) – Home Use • Enterprise (802.1x/EAP) – Office Use
About EAP Extensible Authentication Protocol (EAP) RFC 2284 http://www.ietf.org/rfc/rfc 2284.txt RFC 3748 (Obsoletes 2284) http://www.ietf.org/rfc/rfc3748.txt It is an authentication framework over data link layer An authentication framework which supports multiple authentication methods. EAP typically runs directly over data link layers such as Point-to-Point Protocol (PPP) or IEEE 802, without requiring IP .
EAP — Protocol Flow Authentication Server Client
Authenticator CAPWAP
EAP Authentication Types CertificateBased
Tunneling-Based EAPPEAP
Inner Methods
EAPTTLS EAP-GTC
EAP-MSCHAPv2
EAP-TLS
EAPFAST
Tunnel-based - Common deployments use a tunneling protocol (EAP-PEAP) combined with an inner EAP type such as EAPMSCHAPv2. This provides security for the inner EAP type which may be vulnerable by itself.
Certificate-based – For more security EAP-TLS provides mutual authentication of both the server and client.
EAP Methods Comparison EAP-TLS
PEAP
EAP-FAST
Fast Secure Roaming (CCKM)
Yes
Yes
Yes
Local WLC Authentication
Yes
Yes
Yes
OTP (One Time Password) Support
No
Yes
Yes
Server Certificates
Yes
Yes
No
Client Certificates
Yes
No
No
PAC (Protected Access Credentials)*
No
No
Yes
High
Medium
Low
Deployment Complexity * PACs can be provisioned anonymously for minimal complexity.
Choosing an EAP Method Security vs. Complexity Authentication Server Support
Client Support
EAP Type(s) Deployed
Most clients such as Windows, Mac OSX, Apple iOS devices support EAP-TLS, PEAP (MS-CHAPv2). Additional supplicants can add more EAP types (Cisco AnyConnect).
Certain EAP types (TLS) can be more difficult to deploy than others depending on device type.
Encryption Evolution
WEP
TKIP
AES
(RC4)
(RC4 and MIC)
(CCMP)
Encryption Best Practices: TKIP and AES TKIP (Temporal Key Integrity Protocol)
• Use only for legacy clients without AES support • Often a software update for WEP clients • Can be run in conjunction with AES (mixedmode) • Is being discontinued by the WiFi Alliance for certification. AES (Advanced Encryption Standard)
• Requires hardware support (~2005 chipsets or later) • Achieves line-rate speeds • Only encryption standard supported for 802.11n data rates
User-Based Policy and Device Identification
Cisco User-Based Policy Offering ISE
• Dynamic Policy • Device Profiling
ACS
• Static Policy
User Specific Attributes
WLC
• Cisco ACS (or other RADIUS server which can provide Vendor Specific Attributes) can provide static user-based policy which is assigned upon initial authentication. • Cisco Identity Services Engine can provide dynamic user-based policy which can be assigned upon initial authentication and changed during a session using CoA (Change of Authorization).
Cisco User-Based Policy Solution with ACS Employees
User Specific Attributes
• Employee VLAN • Gold QoS Contractors • Contractor VLAN • No QoS • Restrictive ACL
User Specific Attributes
ACS*
• Static Policy
Employee
Employee VLAN Employee
Contractor
WLC
ACLs
Contractor VLAN
*This could also be any RADIUS server that supports VSAs.
Cisco ACS User Policy Steps
Phase 1
User Authentication
Phase 2
User Policy
EAP ACS
Limited Access
Allowed User?
Allowed Access
WLC
QoS
• Silver
ACL
• Allow-All
VLAN
• Employee
Cisco Controller User-Based Policy Attributes Network Access • “Airespace-Interface-Name” • Sets the Interface to which the client is connected.
Network Restrictions • “Airespace-ACL-Name” • Sets the Access Control List used to filter traffic to/from the client.
Quality of Service • “Airespace-QOS-Level” • Sets the maximum QoS queue level available for use by the client (Bronze, Silver, Gold or Platinum). • “Airespace-802.1p-Tag” and/or “Airespace-DSCP-Tag” • Sets the maximum QoS tagging level available for use by the client.
Cisco Wireless LAN Controller ACLs Inbound Wired LAN
Outbound
Implicit Deny All at the End
• ACLs provide L3-L4 policy and can be applied per interface or per user. • Cisco 5508 and WiSM2 implement line-rate ACLs. • Upto 64 rules can be configured per ACL.
Endpoint Access Challenges •
-
User Device association
•
But there barriers: -
Multiple access mediums
-
Endpoint certainty
-
No automated way to discover new endpoints
Attribute X
ID devices that cannot authenticate Device
-
Time
Classifying managed vs. unmanaged endpoints Location
-
User
IT is struggling with:
PC and Non-PC Devices
Endpoint Profiling Solution - Cisco Identity Services Engine (ISE) •
-
Holistic (wired + wireless)
-
Integrated Authentication, Authorization
-
Other services (Guest, Posture, Device Registration)
-
Flexible deployment ISE
Attribute X
Complete visibility and tracking
Device
-
Time
Multiple sensors – rich profiling
Location
-
User
New ground up solution
Integrated, Enhanced Device Profiling with Cisco Identity Services Engine
“iPad Template”
“Custom Template”
Visibility for Wired and Wireless Devices
Simplified “Device Category” Policy
Create Your Own Device Templates
Powerful Policy Deployments with ISE Consolidated Services, SW Packages
Session Directory
Flexible Service Deployment
ACS User ID
NAC Manager
Device (and IP/MAC)
All-in-One HA Pair
Admin Console
M&T
NAC Profiler ISE
NAC Server
Distributed PDPs NAC Guest
Simplify Deployment and Admin
Policy Extensibility
Link in Policy Information Points
Location
Access Rights
Tracks Active Users and Devices
Manage Security Group Access SGT
Public
Private
Staff
Permit
Permit
Guest
Permit
Deny
Keep Existing Logical Design
Optimize Where Services Run
System-Wide Monitoring and Troubleshooting
Consolidated Data, 3 Click Drill-In
Cisco’s User-Based Policy Solution with ISE User and Device Specific Attributes Employees
ISE
• Device Profiling • Dynamic Policy
• Employee VLAN • Gold QoS Employee Mobiles • Employee VLAN • Gold QoS • Restrictive ACL Contractors • Contractor VLAN • No QoS • Restrictive ACL Contractor Mobiles • No Access
Employee VLAN WLC Contractor VLAN
• With the ISE, Cisco wireless can support multiple users and device types on a single SSID.
Cisco ISE Device Profiling and Policy Steps
EAP
Phase 1
Device Authentication
MAC, DHCP, DNS, HTTP
Phase 2
Device Identification
ISE
Phase 3 Limited Access
Allowed Device?
Allowed Access
Device Policy
WLC
QoS
• Silver
ACL
• Allow-All
VLAN
• Employee
ISE Device Profiling Capabilities Smart Phones Minimum Confidence for a Match
Multiple Rules to Establish Confidence Level Gaming Consoles
Workstations
ISE Device Profiling Example - iPad • Once the device is profiled, it is stored within the ISE for future associations: Is the MAC Address from Apple?
Does the Hostname Contain “iPad”?
Is the Web Browser Safari on an iPad? ISE
Apple iPad
Cisco ISE Provides Policy for Wired and Wireless LANs
NCS ISE
Centralized Monitoring of Wired and Wireless Networking, Users and Endpoints
Central Point of Policy for Wired and Wireless Users and Endpoints
• Unified wired and wireless policy (ISE) and management (NCS).
Client Type and Policy Visibility with NCS and ISE Integration
Device Identity from ISE Integration AAA Override Parameters Applied to Client Policy Information Including Posture
NCS Provides Cross-Linking to ISE Reports on Profiling
Rogue Management, Attack Detection and Threat Mitigation
WLAN Security Vulnerabilities and Threats On-Wire Attacks Ad-Hoc Wireless Bridge
Over-the-Air Attacks Reconnaissance
Evil Twin/Honeypot AP HACKER’S AP
HACKER
Client-to-Client Backdoor Access
Connection to Malicious AP
Rogue Access Points
Denial of Service
HACKER
Seeking Network Vulnerabilities
Cracking Tools HACKER
HACKER DENIAL OF SERVICE
Backdoor Network Access
Service Disruption
Sniffing and Eavesdropping
Non-802.11 Attacks Backdoor Access BLUETOOTH AP
Service Disruption MICROWAVE
BLUETOOTH
RF-JAMMERS
RADAR
Cisco Rogue Management Diagram Multiple Methods Switchport Tracing
Si
Si
Network Core
Si
Wireless Control System (WCS)
Distribution
Wireless LAN Controller
Access RLDP Rogue AP
RRM Scanning
Authorized AP
Rogue AP
Rogue Detector
Rogue AP
Listening for Rogues
Detect
Two Different AP Modes for RRM Scanning Local Mode Access Points
Monitor Mode Access Points
Rogue Detection Mechanisms
• Serves clients with time-slicing off channel scanning • Listens for 50ms on each channel • Configurable to scan: • All Channels • Country Channels (Default) • DCA Channels
• Dedicated to scanning • Listens for 1.2s on each channel • Scans all channels
• Any AP not broadcasting the same RF Group name or part of the same mobility group is considered a rogue • Automatic white listing for autonomous APs managed by WCS
RRM Channel Scanning
Detect
Local Mode AP AP on Channel 1 - 802.11 b/g/n – US Country Channels 10ms 10ms 16s 50ms 16s 50ms 1
2
1
16s
3
50ms 16s 50ms 16s 50ms 16s 50ms 16s
1
4
1
5
1
6
1
7
1
…
Every 16s, a new channel is scanned for 50ms (180sec / 11 channels = ~16s) AP on Channel 36 - 802.11 a/n – US Country Channels (without UNII-2 Extended) 10ms 10ms 14.5s 50ms 14.5s 50ms 14.5s 50ms 14.5s 50ms 14.5s 50ms 14.5s 50ms 14.5s 50ms 14.5s 50ms 36
40
36
44
36
48
36
52
36
56
36
60
36
64
36
149
…
Every 14.5s, a new channel is scanned for 50ms (180sec / 12 channels = ~14.5s)
RRM Channel Scanning
Detect
Monitor Mode AP 802.11b/g/n – All Channels 10ms 10ms 1.2s 1.2s 1
1.2s 1.2s
2
3
1.2s
1.2s
5
6
4
1.2s 1.2s 7
1.2s 1.2s
8
9
10
1.2s 1.2s 11
12
1.2s …
Each channel is scanned a total of ~10.7s ((180s / 1.2s) / 14ch) within the 180s channel scan duration 802.11a/n – All Channels 10ms 10ms 1.2s
1.2s
36
40
1.2s 1.2s 44
48
1.2s 1.2s 52
56
1.2s 60
1.2s 1.2s 64
100
1.2s
1.2s
1.2s
1.2s
1.2s
104
108
112
116
132
1.2s 1.2s 136
140
…
Each channel is scanned a total of ~6.8s ((180s / 1.2s) / 22ch) within the 180s channel scan duration
Detect
802.11n Rogue Detection 802.11n - Mixed Mode • Detectable by 11a/g devices • The most common mode of 11n access points • Facilitates backwards compatibility with 802.11a/g clients by using 11a/g modulation for management and control frames. 802.11n – Greenfield Mode • Only detectable by 802.11n devices • In this case, management, control and data frames are sent using 11n modulation schemes
Rogue Classification Rules
Classify
Concept Classification based on threat severity and mitigation action Rules tailored to customer risk model
Lower Severity
Higher Severity
Off-Network Secured Foreign SSID Weak RSSI Distant Location No Clients
On-Network Open Our SSID Strong RSSI On-Site Location Attracts Clients
Rogue Classification Rules
Classify
Examples
Detected as Rogue
Rogue Rule: SSID: speedy RSSI: -80dBm
Marked as Friendly
Rogue Rule: SSID: Corporate RSSI: -70dBm
Marked as Malicious
Rogues Matching No Rule
Marked as Unclassified
Rules Are Stored and Executed on the Wireless LAN Controller
Rogue Classification Rules
Classify
Configuration
Rules Sorted by Priority
Classify
WCS Security Dashboard Controller IDS and Adaptive wIPS Alarms Security Index
Rogues by Category
Rogue Detector AP Mode
Classify
Concept
Authorized AP
Rogue AP
Client ARP
L2 Switched Network Trunk Port Wired Rogue Detector AP Detects all rogue client and Access Point ARP’s Controller queries rogue detector to determine if rogue clients are on the network Does not work with NAT APs
Rogue Detector
Rogue Detector AP Mode
Classify
Floor 3
Rogue Detector Floor 3
Floor 2
Rogue Detector Floor 2
Floor 1
Example Deployment Scenario
Rogue Detector Floor 1
Install one rogue detector at each Layer 3 boundary. Put more simply - ensure all VLANs are monitored by a rogue detector.
Rogue Detector AP Mode
Classify
Operation
WCS
WLC
Alarm Changed from Minor to Critical
Security Alert: Rogue with MAC Address: 00:09:5b:9c:87:68 Has Been Detected on the Wired Network
0009.5b9c.8768
Rogue Detector
0021.4458.6652
> debug capwap rm rogue detector ROGUE_DET: Found a match for rogue entry 0021.4458.6652 ROGUE_DET: Sending notification to switch ROGUE_DET: Sent rogue 0021.4458.6652 found on net msg
Rogue Detector AP Mode
Classify
Configuration
WLC All Radios Become Disabled in This Mode
Switch
interface GigabitEthernet1/0/5 description Rogue Detector switchport trunk encapsulation dot1q switchport trunk native vlan 113 switchport mode trunk spanning-tree portfast
AP VLAN
Rogue Location Discovery Protocol
Classify
Concept Connect as Client Managed AP
Rogue AP
Routed/Switched Network
RLDP (Rogue Location Discovery Protocol) Connects to Rogue AP as a client Sends a packet to controller’s IP address Only works with open rogue access points
Send Packet to WLC
Controller
Rogue Location Discovery Protocol
Classify
Operation
WCS
WLC
Alarm Changed from Minor to Critical
Security Alert: Rogue with MAC Address: 00:13:5f:fa:27:c0 Has Been Detected on the Wired Network > debug dot11 rldp Successfully associated with rogue: 00:13:5f:fa:27:c0 Sending DHCP packet through rogue AP 00:13:5f:fa:27:c0 RLDP DHCP BOUND state for rogue 00:13:5f:fa:27:c0 Returning IP 172.20.226.253, netmask 255.255.255.192, gw 172.20.226.193 Send ARLDP to 172.20.226.197 (00:1F:9E:9B:29:80) Received 32 byte ARLDP message from: 172.20.226.253:52142
00:13:5f:fa:27:c0
%LWAPP-5-RLDP: RLDP started on slot 0. %LINK-5-CHANGED: Interface Dot11Radio0, changed state to reset %LINK-3-UPDOWN: Interface Dot11Radio0, changed state to up %LWAPP-5-RLDP: RLDP stopped on slot 0.
Rogue Location Discovery Protocol Automatic Operation
• Two automatic modes of operation: ‘AllAPs’ – Uses both local and monitor Aps ‘MonitorModeAPs’ – Uses only monitor mode APs
• Recommended: Monitor Mode APs – RLDP can impact service on client serving APs
Classify
Switchport Tracing
Classify
Concept Match Found
2
3 CAM Table
CAM Table
WCS
1 Show CDP Neighbors
Managed AP WCS Switchport Tracing Identifies CDP Neighbors of APs detecting the rogue Queries the switches CAM table for the rogue’s MAC Works for rogues with security and NAT
Rogue AP SPT Matches On: Rogue Client MAC Address Rogue MAC Address Rogue MAC +1/-1 Rogue Vendor OUI
WCS Switchport Tracing
Classify
Operation (Cont.)
Uncheck to Shut the Port
WCS
Match Type
Number of MACs Found on the Port
Rogue Location
Mitigate
On-Demand with WCS
• Allows an individual rogue AP to be located on-demand • Keeps no historical record of rogue location • Does not locate rogue clients
WCS
Rogue Location
Mitigate
In Real-Time with WCS and MSE Context-Aware
• Track of multiple rogues in real-time (up to MSE limits) • Can track and store rogue location historically • Provides location of rogue clients • Provides location of rouge ad-hoc networks
WCS
Rogue Containment
Mitigate
Concept
Mitigate
Rogue Client Authorized AP
De-Auth Packets
Rogue AP
Rogue AP Containment Sends De-Authentication (or Disassociation) Packets to Client and AP Can use local, monitor mode or H-REAP APs Impacts client performance on local/H-REAP APs A temporary solution till the rogue can be tracked down.
Rogue Containment
Mitigate
Local Mode APs
De-Auth
3 Local Mode
Broadcast and Unicast Deauth Frames
A local mode AP can contain 3 rogues per radio Containment packets sent every 500ms
Rogue Containment
Mitigate
Monitor Mode APs
De-Auth Unicast Deauth and Unicast Disassociation Frames Dis-Association
6 Monitor Mode
A monitor mode AP can contain 6 rogues per radio Containment packet sent every 100ms
Rogue Containment
Mitigate
Auto-Containment Configuration Ability to Use Only Monitor Mode APs for Containment to Prevent Impact to Clients
WLC
• Use auto-containment to nullify the most alarming threats • Containment can have legal consequences when used improperly
Cisco’s Attack Detection Mechanisms
Base IDS
Adaptive wIPS
Built-In to Controller Software
Requires MSE
Uses Local and Monitor Mode APs
Uses wIPS Monitor Mode and/or Local APs
Adaptive wIPS Components and Functions
AP
Attack Detection
24x7 Scanning Over-the-Air Detection
WLC
Configuration wIPS AP Management
MSE
Alarm Archival
Capture Storage Complex Attack Analysis, Forensics, Events
WCS / NCS
Centralized Monitoring
Historic Reporting Monitoring, Reporting
Cisco Adaptive wIPS with Dedicated Monitor Mode APs • Adaptive wIPS monitor mode is available for 1130/1240, 1040/1140/1250, 1260 and 3500 Access Points
Adaptive wIPS Monitor Mode Deployment Recommendations • Monitor-mode wIPS APs do not serve clients, thus have greater range Client-serving AP typically covers 914.4-1524 square meters wIPS AP typically covers 4572– 10668 square meters
• Ratio of wIPS monitor-mode APs to local-mode traffic APs varies by network design, but 1:5 ratio is reasonable estimate • wIPS APs can simultaneously run contextaware location in monitormode
Cisco Adaptive wIPS with Enhanced Local Mode (ELM) • Adaptive wIPS scanning in data serving access points, including HREAP mode APs. • Provides protection without needing a separate overlay network. • ELM supported APs: 1040, 1140, 1250, 1260 & 3500 Without ELM Data Serving
wIPS Monitor Mode
With ELM Single Data and wIPS AP
Cisco Adaptive Wireless IPS with Enhanced Local Mode Can Reduce Capital Investment by > 50%
Mobility Services Engine Support for Cisco Motion Services 3310 Mobility Services Engine
3355 Mobility Services Engine
Supports Adaptive wIPS for up to 2000 Monitor Mode APs
Supports Adaptive wIPS for up to 3000 Monitor Mode APs
Supports Context Aware for up to 2000 Tracked Devices
Supports Context Aware for up to 18000 Tracked Devices
• Services can co-exist on the same MSE, but per-service maximums decrease. For Example, the MSE3310 can handle 1000 wIPS APs + 1000 Context Tracked Items.
• Mobility services may have different WLC/WCS software requirements • Adaptive wIPS is licensed on a per-AP basis (both monitor mode and ELM APs count the same)
Comparison Between Base IDS and Adaptive wIPS Local
Monitor
wIPS ELM
wIPS Monitor
Client Service
Yes
X
Yes
X
Rogue Detection and Containment
Yes
Yes
Yes
Yes
Attacks Detected
17
17
39
45
Attack Encyclopedia
X
X
Yes
Yes
Forensics
X
X
Yes
Yes
Anomaly Detection
X
X
Yes
Yes
MSE Required
X
X
Yes
Yes
WCS Required
X
X
Yes
Yes
Management Frame Protection Concept Problem
Solution
• Wireless management frames are not authenticated, encrypted, or signed • A common vector for exploits
• Insert a signature (Message Integrity Code/MIC) into the management frames • Clients and APs use MIC to validate authenticity of management frame • APs can instantly identify rogue/exploited management frames
Infrastructure MFP Protected
CCXv5
AP Beacons
Probe Requests/ Probe Responses
Associations/Re-Associations
Disassociations
Authentications/ De-Authentications
Action Management Frames
Client MFP Protected
Cisco Wired IPS Integration Unified Intrusion Prevention Business Challenge
Mitigate Network Misuse, Hacking and Malware from WLAN Clients Client Shun
• Inspects traffic flow for harmful applications and blocks wireless client connections • Layer 3-7 Deep Packet Inspection • Eliminates risk of contamination from wireless clients
L2 IDS
Malicious Traffic
L3-7 IDS Enterprise Intranet
• Zero-day response to viruses, malware and suspect signatures Cisco ASA with IPS http://www.cisco.com/en/US/tech/tk722/tk809/technologies_configuration_example09186a008080dc8c.shtml
WLAN Security Vulnerabilities and Threats On-Wire Attacks Ad-Hoc Wireless Bridge HACKER
Rogue Detection, Classification and Mitigation Addresses Rogue Access Points These Attacks
Client-to-Client Backdoor Access
Over-the-Air Attacks Reconnaissance
Evil Twin/Honeypot AP
MFP Neutralizes All HACKER’S Management Frame AP Exploits, Such as Man-inthe-Middle Attacks
HACKER
Connection to Malicious AP
SeekingWPA2/802.11i Network Vulnerabilities
Denial of Service
Neutralizes Recon and CrackingTools Attacks Cracking HACKER
HACKER
wIPS Detects DENIAL OFThese SERVICE Attacks Backdoor Network Access
Service Disruption
Sniffing and Eavesdropping
Non-802.11 Attacks Backdoor Access BLUETOOTH AP
Service Disruption MICROWAVE
BLUETOOTH
RF-JAMMERS
RADAR
Interference Also Presents a Security Concern Throughput Reduction Near
Far
(7.6 m)
(22.8 ft)
Jammer
100%
100%
Video Camera
100%
57%
90%
75%
Microwave Oven
63%
53%
Bluetooth Headset
20%
17%
DECT Phone
18%
10%
Interference Type
End User Impact
Reduced network capacity and coverage Poor quality voice and video
Wi-Fi
Potential Denial of Service IT Manager Impact
Potential security breaches Support calls Increased cost of operation
(busy neighbor)
CleanAir is Purpose Built to Deal with Interference Issues Detect and Classify 97
• 100
•
63 90 20 35
• •
Cisco CleanAir
Uniquely identify and track multiple interferers Detects security-risk interferers like RF Jammers and Video Camera. Assess unique impact to Wi-Fi performance Monitor AirQuality
High-Resolution Interference Detection and Classification Logic Built-In to Cisco’s 802.11n Wi-Fi Chip Design. Inline Operation with No CPU or Performance Impact.
WLAN Security Vulnerabilities and Threats On-Wire Attacks Ad-Hoc Wireless Bridge HACKER
Rogue Detection, Classification and Mitigation Addresses Rogue Access Points These Attacks
Client-to-Client Backdoor Access
Over-the-Air Attacks Reconnaissance
Evil Twin/Honeypot AP
MFP Neutralizes All HACKER’S Management Frame AP Exploits, Such as Man-inthe-Middle Attacks
HACKER
Connection to Malicious AP
SeekingWPA2/802.11i Network Vulnerabilities
Denial of Service
Neutralizes Recon and CrackingTools Attacks Cracking HACKER
HACKER
wIPS Detects DENIAL OFThese SERVICE Attacks Backdoor Network Access
Service Disruption
Sniffing and Eavesdropping
Non-802.11 Attacks
Cisco CleanAir Detects These Attacks Backdoor Access BLUETOOTH AP
Service Disruption MICROWAVE
BLUETOOTH
RF-JAMMERS
RADAR
Thank you.