Firewall News

Top Menu

  • Home
  • Our Blog
  • Contact Us

Main Menu

  • Software Updates
  • Alerts & Bugs
  • Out of the Box
  • Home
  • Our Blog
  • Contact Us

Firewall News

Firewall News

  • Software Updates
    • WatchGuard logo

      TDR 6.0.0 is now integrated into WatchGuard Cloud

      04/01/2021
      0
    • Sophos Logo

      XG Firewall 17.5 MR14 Released

      30/07/2020
      0
    • Sophos Logo

      Sophos Firewall Manager SFM 17.1 MR4 Released

      27/07/2020
      0
    • Sophos Logo

      Sophos Enterprise console - Endpoint Security and Control v10.8.9 for Windows has ...

      16/07/2020
      0
    • Sophos Logo

      Sophos iView v3 MR-2 Released

      07/07/2020
      0
    • Sophos Logo

      SD-RED Firmware 3.0.002 Pattern Update

      06/07/2020
      0
    • Sophos Logo

      XG Firewall 17.5 MR13 Released

      06/07/2020
      0
    • Sophos Logo

      End-of-Life (EoL) announcement for old firmware v17 and v17.1 for XG Firewall

      03/07/2020
      0
    • WatchGuard logo

      Fireware 12.5.4 Now Available

      01/07/2020
      0
  • Alerts & Bugs
    • Sophos Logo

      Advisory: Sophos Central Maintenance scheduled for Saturday, April 2nd, 2022

      29/03/2022
      0
    • Sophos Logo

      Sophos: Important Product Lifecycle Updates

      03/03/2022
      0
    • WatchGuard logo

      WatchGuard Support Alert

      23/02/2022
      0
    • Sophos Logo

      Sophos: Important Product Lifecycle Reminder

      03/02/2022
      0
    • Sophos Logo

      Sophos: Product Lifecycle Information: Extended Support for Windows 7 and Windows Server ...

      31/01/2022
      0
    • Sophos Logo

      End-of-Life (EoL) announcement for Sophos SSL VPN Client

      29/11/2021
      0
    • WatchGuard logo

      WatchGuard: macOS Monterey 12.0.1 Does Not Support the AuthPoint Logon App

      09/11/2021
      0
    • Sophos Logo

      Sophos UTM Manager (SUM) End of Distribution

      04/11/2021
      0
    • WatchGuard logo

      WatchGuard: End of Sale Notice: AP420

      01/11/2021
      0
  • Out of the Box
    • WatchGuard’s Firebox T80 Earns 5-Star Rating in SC Labs Review

      17/11/2020
      0
    • WatchGuard Wins Big in CRN 2020 Tech Innovator Awards

      16/11/2020
      0
    • Coronavirus scams: what to look for and how to stop them

      02/04/2020
      0
    • Dell SonicWALL TZ 300

      Out the Box - Dell SonicWALL TZ 300

      05/07/2016
      0
    • Dell SonicWALL TZ SOHO

      Out the Box - Dell SonicWALL TZ SOHO

      05/07/2016
      0
    • WatchGuard Firebox T50

      WatchGuard Firebox T50

      31/03/2016
      0
    • WatchGuard Firebox M200

      WatchGuard Firebox M200

      31/03/2016
      0
News
Home›News›Securing Your Airspace with WatchGuard’s Wireless Intrusion Prevention (WIPS)

Securing Your Airspace with WatchGuard’s Wireless Intrusion Prevention (WIPS)

By admin
27/07/2017
2906
0
Share:
WatchGuard logo
Introduction
The proliferation of Wi-Fi across the globe has created an attractive opportunity for cyber attackers to snoop, steal, and infect unsuspecting users’ data and systems. As of the publication of this document, there are over 300,000 videos on YouTube explaining how to hack Wi-Fi users with simple-to-use but highly powerful tools easily found online. Offering Wi-Fi within your business – whether for employees or for customers and guests – shouldn’t invite such malevolent activity. In this feature brief, we will describe how WatchGuard’s Wireless Intrusion Prevention System (WIPS) solves this problem. WIPS is available with WatchGuard cloud-ready access points when managed by the WatchGuard Wi-Fi Cloud.
Current solutions fall dramatically short
Competing wireless intrusion prevention systems mostly focus on detection – rather than prevention – for concern of interfering with legitimate neighbouring Wi-Fi networks. This is due to the large number of false positives detected by competing solutions, which can lead administrators to ignore the alerts or turn notifications off altogether, leaving their organisations unprotected. Competing WIPS technologies available today require a high level of administration and often provide less than trustworthy rogue AP detection. Organisations that depend on these inadequate systems often have an erroneous sense of security as their networks are in fact vulnerable to breaches via rogue APs.
Own your airspace
With WatchGuard’s WIPS, enterprise-grade security can be delivered to a Wi-Fi network with minimal administrative overhead for businesses requiring adherence to compliance standards such as PCI, HIPAA, and Sarbanes Oxley. WatchGuard WIPS leverages patented Marker Packet technology to provide the most rock-solid, reliable, and lowest false positive WIPS in the industry, giving anyone the power to own theirWi-Fi airspace.
How Do I Enable and Deploy WatchGuard’s WIPS?
WatchGuard WIPS is supported on all cloud-ready access points when managed by the WatchGuard Wi-Fi Cloud with active WatchGuard Wi-Fi Cloud licenses. The deployment of WIPS can be achieved in two ways:
1. Recommended: dedicated WIPS sensors
This deployment option involves configuring cloud-ready APs as dedicated WIPS sensors. As a dedicated WIPS sensor, the AP will not allow any wireless clients to connect to it and instead is installed side-by-side with other APs that are configured to handle client traffic. A general rule of thumb for WIPS sensor-to-AP coverage is to install one WIPS sensor for every four APs. This is the recommended deployment model suggested by WatchGuard, providing the securest wireless environment by having dedicated WIPS sensor radios constantly defending the airspace and preventing attackers from taking advantage of time slice windows created by a shared AP/WIPS mode radio.
2. Shared WIPS/AP radios
All cloud-ready APs can be configured to share a portion of their radios’ time (as a percentage) between handling wireless client traffic and scanning for WIPS. In this mode, a single AP acts as both an access point and WIPS sensor; however the wireless-side packet injection functionality is not available.
Dedicated Scanning
– Radio dedicated to scanning – dual-band round robin scanning (each channel scanned for 100 ms every 5 second)
– Fast threat detection on all channels
– Can do both over-the-air and over-the-wire prevention.This provides blocking for all threat types.
– Main application: High security/compliance-sensitive environments (financial, government, healthcare, technology, schools, etc.)
Background Scanning
– Radio operating as AP with dual-band scanning in the background (off-traffic channel scanned for 100 ms every 2 minute)
– Off-traffic channel threat detection can take time (still best in industry for rogue APs as Marker Packets™injection is timed with channel visits)
– Only over-the-wire prevention (blocks rogue APs with wireside tarpitting)
– Main application: Retail PCI compliance
How WatchGuard’s WIPS Works
Wired-side marker packet injection
WIPS injects Marker Packets into the wired network from the wired side of a WIPS/AP. These packets are relayed to the wireless side by APs that are connected to the monitored wired network, which are then detected over the air by the wireless side of the WIPS/AP. The AP may be placed in a subnet or on a trunk port of a managed switch for multiple subnets.
Advantages of this technique are:
• It does not require intrusive interaction with the switches in the network
• It does not require any initial or ongoing configuration to be operational
• This technique quickly detects the APs’ connectivity irrespective of the size of the network, since it operates on each local subnet simultaneously
• The volume of traffic generated due to packet injection is negligible (less than 0.1% of the LAN port capacity)
• This technique is free from false alarms in that it never marks rogue APs as external APs; nor does it mark external APs as rogues
 
Wireless-side marker packet injection
Once the WIPS/AP sees a client associated to an AP, it sends packets with a unique identifier (Marker Packets) from the wireless side of the potential rogue AP directed towards the IP addresses of a known wire-side host. These packets are piggybacked on the client’s link with the potential rogue AP. If any of these packets are received at the target host, the AP is confirmed to be connected to the monitored wired network.
Unique differentiator: auto-AP classification
The most natural and elegant way to classify APs is via network connectivity detection. This type of auto-classification does not require unreliable or unmanageable classification signatures based on SSID, vendor, power level, encryption setting or channel; all it needs is reliable network connectivity and access to the desired VLANs.
Accurate, dependable AP auto-classification is a key to an effectiveWireless Intrusion Prevention System. WatchGuard’s WIPS is the only technology that provides built-in AP network connectivity-based auto-classification. This is made possible by our use of unique MarkerPacket technology, which accurately detects network connectivity of all types of APs. The Marker Packet technology is a true differentiator in the WIPS solution space.
AP auto-classification places visible APs into three categories:
• Authorized – Managed APs in the wired network, which theadministrator knows about
• External – Unmanaged APs in the wireless neighborhood, whichare not connected to the monitored wired network
• Rogue – Unauthorised APs installed in the wired network without administrator knowledge
Advantages of WatchGuard WIPS:
• Real prevention, not just detection
• Marker Packet technology
• Accurately classifies devices on the wire with near zero false positives
• Detects, classifies and prevents NAT’d, encrypted, and soft APs
• Detects and blocks unauthorised client behaviour
• Auto prevention without harming neighbouring devices or networks
• Multiple threat prevention across multiple channels from a single sensor
• Blocks multiple types of 802.11 DoS attacks
• Wireless policies enforced per VLAN, SSID, and location
• Multi-VLAN support (up to 100 VLANs from a single sensor)
• Does not rely on CAM table look-ups or SNMP
• Mobile device watch list
• Off-line sensor mode (always-on security)
• Remote packet capture (R-PCAP) from any sensor
• Most accurate location-tracking from single sensor
• Ability to manage thousands of sensors from a single console
• Various automated security and compliance reports
• Ease of use and deployment / lowest TCO
• Exceeds DoD 8100.2 WIDS requirements
• Provides constant “no Wi-Fi” policy enforcement on wired VLANs in the
network
5 Pitfalls of Competing WIPS Solutions
All WIPS are NOT created equal and to help illustrate that point, consider these five pitfalls found in most competing WIPS solutions on the market:
1. Competing rogue AP detection
Rogue APs can be defined as any unauthorised AP that is connected to an authorised network. Rogue APs are a serious threat to networks as they allow unauthorised wireless access to the private network. Rogue APs can appear on the network caused involuntarily by employees or due to malicious attempts of insiders. Many competing WIPS solutions utilise a flawed method to detect rogue APs in the LAN by declaring every AP seen in the air that does not belong to the list of authorised APs as rogue.
Such an approach has the following disadvantages:
• False alarms: a security alert would be raised even if the non-authorised AP is seen in the air but not actually connected to the monitored wired network and as such does not pose any security threat.
• Manual intervention: the system administrator has to manually examine the non-authorised APs visible in the air to decide which of them are actual rogue APs and which of them are external APs (i.e., neighbour APs).
• No automatic instantaneous prevention: since it is highly undesirable to block neighbours’ APs accidentally or indiscriminately, instantaneous and automatic blocking of rogue APs is not possible with such an approach.
2. Competing signature-based WIPS
Many competing WIPS attempt to classify APs based on user-configured classification signatures. A myriad of AP properties such as SSID, vendor, power level, encryption settings and channels are used to define classification signatures. Network connectivity of the AP to the network may or may not even be a factor in classification rules. This approach has several disadvantages:
• Maintaining signatures: significant configuration overhead is involved in defining classification signatures. The signatures need to be regularly updated, e.g., what happens when a known friendly neighbourhood WLAN configuration is changed to use a different SSID?
• Ongoing manual intervention: wireless configurations of newly detected APs may not exactly match the defined signatures, in which case, manual intervention is required to classify the newly detected APs.
• Missed threats: this approach often misses genuine threats. For example, a classification signature, such as: if “SSID = free wifi AND signal strength = Low”; then classify as known neighbour AP, will be evaded by a rogue AP with low transmit power whose SSID is configured to be “free wifi.”
3. Competing MAC table lookup
This technique compares MAC addresses of wireless devices visible in the air with MAC addresses registered at the ports of managed switches in the wired network. If a common MAC address is found between the wireless and the wired sides, it is determined that the device with that MAC address is connected to the monitored wired network.
In the case of bridging APs, detection must wait until a client connects to the AP. After the client connects, its MAC address gets registered in the switch port where the AP is connected. Collection of MAC addresses registered at the ports of managed switches in the network is performed by polling the CAM tables of each switch over SNMP.
This suffers from several disadvantages:
• This technique is intrusive on switching infrastructure. It requires maintenance of switch credentials in the WIPS so that it can poll MAC tables of the switches. It also suffers from interoperability problems with switches from different vendors.
• MAC table polling of all managed switches in the network is a resource-intensive and time-consuming task, especially in large networkswith hundreds of switches. Thus, in large networks, network connectivity detection with this approach can only happen infrequently.
• There is a “luck” factor involved in detection. A client’s MAC entry disappears from the MAC table after the client becomes inactive, so when MAC table polling occurs (this is typically scheduled at periodic intervals) the technique is only successful while the client is actually connected to the rogue AP.
4. Competing passive MAC correlation
This method attempts to overcome MAC table lookup disadvantages. In this technique, the WIPS AP passively listens on its wire-side interface forMAC addresses that are active on the subnet. MAC addresses discovered by this technique are used for wired/wireless MAC address correlation. However, even this approach suffers from an issue wherein APs not connected to the monitored network, such as neighbour APs, can appear connected to the monitored wired network. This occurs when clients flip between these APs.
5. Competing wireless-side tracing
In this technique, after a WIPS AP detects an AP in the air, it will try to actively connect to the AP on the wireless side. The WIPS AP then either pings something on the wired network through the potential rogue AP or sends a packet to a known host on the wire-side of the network, to try to detect if the AP is connected to the enterprise wired network.  This approach of actively connecting to the AP has limitations, in that it takes a fair amount of time for the AP to connect to the AP by completing a L2 and L3 connection (for example, up to 5 seconds). During this time, the WIPS AP needs to be locked on the AP’s channel and cannot perform its scanning function. Thus, in the presence of large number of potential rogue APs visible to the WIPS AP, this technique can only be executed infrequently, thereby causing large latency in the detection of AP connectivity.  Moreover, this technique fails to detect rogue APs which may have special settings, such as an authorised client MAC address list on the wireless interface, which can prevent the WIPS AP from actively associating to the potential rogue AP.
Combine Best-in Class WIPS with UTM
The driving principle behind every innovative product from WatchGuard is to deliver enterprise-grade security that fits into small and midsize environments. With the WatchGuard Wi-Fi Cloud, IT pros can deliver the high performance wireless connectivity their users demand – without compromising on security – by combining the world’s leading WIPS technology with best-in-class UTM services.
Visit www.watchguard.com/wifi to learn more about WatchGuard’s family of Secure Wi-Fi solutions.
Previous Article

WatchGuard Wi-Fi Cloud Maintenance

Next Article

Sophos XG Firewall flies high in NSS ...

0
Shares
  • 0
  • +
  • 0
  • 0
  • 0
  • 0

Related articles More from author

  • Sophos is a Leader in the UTM Magic Quadrant
    News

    Sophos is a Leader in the UTM Magic Quadrant

    22/06/2017
    By admin
  • NewsTrendMicro

    Trend Micro tackles dark web identity theft with ID Security

    12/05/2020
    By admin
  • BarracudaNews

    Barracuda expands regional availability zones in Australia and Canada

    12/02/2020
    By admin
  • SNWL Channelnomics Award
    News

    SonicWall’s Steve Pataky Nominated for Channelnomics Innovation Awards 2018, Security Channel Chief of the Year

    05/11/2018
    By admin
  • NewsWatchGuard

    CRN Recognizes WatchGuard Leaders in its Women of the Channel and Power 100 lists for 2020

    12/05/2020
    By admin
  • Meraki Las Vegas
    News

    WHAT HAPPENS IN VEGAS…IS POWERED BY MERAKI

    15/08/2017
    By admin

  • SonicWall Logo
    NewsSonicWALL

    SONICWALL CAPTURE ADVANCED THREAT PROTECTION COLLECTS ICSA LABS CERTIFICATION

  • WatchGuard logo
    Software UpdatesWatchGuard

    Watchguard – Threat Detection and Response 5.8.X Beta

  • Sophos Leader
    News

    Sophos is named a Leader in the Gartner UTM Magic Quadrant

Timeline

  • 29/03/2022

    Advisory: Sophos Central Maintenance scheduled for Saturday, April 2nd, 2022

  • 03/03/2022

    Sophos: Important Product Lifecycle Updates

  • 01/03/2022

    Shoring up your cybersecurity posture in light of ongoing crisis

  • 23/02/2022

    WatchGuard Support Alert

  • 03/02/2022

    Sophos: Important Product Lifecycle Reminder

Sponsored Links

Latest Comments

  • Paul Sillars
    on
    21/06/2016
    I received this in an email this morning, it was the first I heard about it ...

    Dell Software Group sold to help fund looming EMC deal

  • Paul Sillars
    on
    20/06/2016
    This is going to be an interesting one to watch. Especially after today's announcement that ...

    Ingram Micro gets distribution access to Dell’s security range in Australia

Find us on Facebook

Firewall.News Logo

This site serves more as a reference point for some of the major security vendor's updates and product/press releases

It will never be a definitive list, but it helps our customers keep up to date and also allows us to express our comment and observations as well.

About us

  • PO Box 451, North Lakes, Queensland, 4509, Australia
  • [email protected]
  • Recent

  • Popular

  • Comments

  • Sophos Logo

    Advisory: Sophos Central Maintenance scheduled for Saturday, April 2nd, 2022

    By admin
    29/03/2022
  • Sophos Logo

    Sophos: Important Product Lifecycle Updates

    By admin
    03/03/2022
  • Shoring up your cybersecurity posture in light of ongoing crisis

    By admin
    01/03/2022
  • WatchGuard logo

    WatchGuard Support Alert

    By admin
    23/02/2022
  • Dell SonicWALL Supermassive

    Ingram Micro gets distribution access to Dell’s security range in Australia

    By admin
    14/06/2016
  • Francisco Partners and Elliott Management to Acquire the Dell Software Group

    Dell Software Group sold to help fund looming EMC deal

    By admin
    21/06/2016
  • WatchGuard Firebox M500 – The Cure for HTTPS Performance Headaches

    By admin
    05/03/2015
  • Sophos Logo

    Advisory: Sophos Central Maintenance scheduled for Saturday, April 2nd, 2022

    By admin
    29/03/2022
  • Paul Sillars
    on
    21/06/2016

    Dell Software Group sold to help fund looming EMC deal

    I received this in ...
  • Paul Sillars
    on
    20/06/2016

    Ingram Micro gets distribution access to Dell’s security range in Australia

    This is going to ...

Follow Me

  • Contact
  • About Us
  • Home