Selecting Countermeasures

Countermeasures mitigate the impact of a security threat. Three main countermeasures are used by the Guardian APs:
  • Sending standard 802.11 deauthentication frames to prevent stations from associating to threat devices.
  • Rate limiting flooded frames. This can prevent floods from propagating through the AP to the wired network.
  • Blacklisting attacking devices to prevent them from gaining access to the wireless network.

To select a specific countermeasure:

Countermeasures are enabled on a per-scan-profile basis. Some scan profiles can have countermeasures enabled while others cannot.

  1. From the top menu, click Radar.
  2. If not already selected, select Security Analysis Engine and click Save.
  3. In the left pane, click Scan Profiles.
  4. Select a Guardian scan profile and click the Prevention tab.
    Click to expand in new window
    Prevention Settings
    Graphics/Guardian_scan_profile_prevention.png
  5. Select desired prevention method.
  6. Select number of channels per radio to defend concurrently. Number of defended channels can be between 1 and 4.
    Click to expand in new window

    Prevention Tab - Fields and Buttons

    Field/Button Description
    Countermeasures
    Prevent authorized stations from roaming to external honeypot APs An external honeypot is an AP that is attempting to make itself a man-in-the-middle by advertising a popular SSID, such as an SSID advertised by a coffee shop or an airport
    Prevent authorized stations from roaming to friendly APs Friendly APs are APs that are not part of the authorized wireless network, but they operate in the vicinity of the authorized wireless network.
    Prevent any station from using an internal honeypot AP An internal honeypot is an AP that is attempting to make itself a man-in-the-middle by advertising an SSID belonging to the authorized wireless network.
    Prevent any station from using a rogue AP A rogue AP is an unauthorized AP connected to the authorized wired or wireless network.
    Prevent any station from using a spoofed AP A spoofed AP s an AP that is not part of the authorized network is advertising a BSSID (MAC address) that belongs to an authorized AP on the authorized network.
    Drop frames in a controlled fashion during a flood attack Prevents some types of Denial of Service (DoS) attack from affecting the authorized network instead of just the target AP. For example, rate limiting the flooded frames.
    Prevent any station from using an ad hoc mode device Deauthentication messages are used to prevent devices from using an ad hoc mode device.
    Remove network access from clients originating DoS and password-cracking attacks Prevents propagation of the DoS attack from the AP to the authorized network. Many types of DoS attack involve deluging an AP with a large volume of messages of one or two specific types. When this option is enabled, the AP will apply rate limits to the specific type of frame that is being deluged.

    The selected clients for this countermeasure are denied access to the network for the amount of time that is specified in " Remove network access from violating clients for a period of time."

    Remove network access from violating clients for a period of time Enter a numeric value in seconds.
    Defense Options
    Maximum number of channels per radio to defend concurrently Click the slider to select the number of channels desired.
    New Click to create a new Guardian scan profile. For more information, click Adding a New Scan Profile.
    Delete Click to delete the selected Guardian scan profile.
    Save Click to save changes.