Linksys WUSB200 manual Disassociation attacking

Page 61

Wireless-G Business USB Network Adapter with RangeBooster

The following table is a summary of the various alert descriptions and advice.

Table 1: Alerts

Item

Alert

Description

Advice

 

 

 

 

 

 

 

Description:

 

 

 

Rogue Client is detected doing one or more illegal actions, e.g., causing Message

 

 

 

Integrity Check (MIC) errors, sending disassociation frames, sending

 

 

 

deauthentication frames, and sending association frames with incorrect

 

 

 

encryption.

 

 

 

MIC error generation: The MIC function prevents attacks on encrypted packets.

 

 

 

During an attack, an intruder intercepts an encrypted (WPA - Personal) message,

 

 

 

alters it slightly, and retransmits it, and the receiver accepts the retransmitted

 

 

 

message as legitimate. This action will cause a MIC error. If an attacker causes

 

 

 

two MIC errors within 60 seconds, it will be considered a Rogue Client.

 

 

 

Disassociation attacking:

 

 

A Rogue Client is detected.

Occurs when a wireless station transmits a disassociation request to an AP which

 

 

it is not associated with.

1

Rogue Client Detected

For details, press the Advice button.

 

 

 

 

De-authentication attacking:

 

 

 

Occurs when a wireless station transmits a de-authentication request to an AP

 

 

 

which it is not associated with.

 

 

 

Authentication failure:

 

 

 

Occurs when the AP receives an association request with different encryption from

 

 

 

a wireless client.

 

 

 

Action:

 

 

 

1. Contact the network administrator and send the administrator the Rogue Client

 

 

 

computer information.

 

 

 

2. Change MAC access control list on the AP and further block the Rogue Client's

 

 

 

activities.

 

 

 

 

Chapter 6: The Administrative Functions in the Wireless Network Monitor

54

Security Monitor

Image 61
Contents Wireless-G Business USB Network Adapter with RangeBooster Copyright and Trademarks How to Use this User GuideTable of Contents Windows XP Wireless Zero Configuration Appendix C Wireless SecurityLEDs List of FiguresCreating a Profile WEP Key Needed 43 Editing a Profile Congratulations Welcome IntroductionWhat’s in this User Guide? Wireless-G Business USB Network Adapter with RangeBooster Network Topology Planning your Wireless NetworkRoaming Network Layout LED Indicators Getting to Know the Wireless-G Business USB Network AdapterSetup Wizard’s Welcome Screen Starting the SetupSetup Wizard’s License Agreement Connecting the AdapterAvailable Wireless Network Setting up the AdapterWEP WPA2-Personal WPA-Personal10 Creating a Profile Manual Setup12 Ad-Hoc Mode Settings 14 Wireless Security WPA Personal TLS EAP-TLS WPA EnterpriseWPA2 Enterprise 20 Wireless Security Radius EAP-TLSRadius Accessing the Wireless Network Monitor Using the Wireless Network MonitorUsing the Wireless Network Monitors Link InformationStatus Link Information Wireless Network StatusStatistics Link Information Wireless Network StatisticsProfile Information ProfilesCreate a New Profile Creating a Profile Available Wireless Network10 Creating a Profile WPA-Personal 12 Creating a Profile Manual Setup Network Settings 15 Creating a Profile Manual Setup Wireless Security WEP Using the Wireless Network Monitor Create a New Profile WPA Enterprise WPA2 Enterprise Radius 24 Creating a Profile Manual Setup Wireless Security Leap Editing a Profile 26 Creating a Profile Manual Setup Congratulations29 Editing a Profile Ad Hoc Mode WEP 32 Editing a Profile Wireless Security WPA Personal 35 Editing a Profile Wireless Security WPA Enterprise Peap 37 Editing a Profile Wireless Security WPA2 Enterprise Peap Radius EAP-TLS Leap 43 Editing a Profile Congratulations Site Information Site SurveyAdministration TroubleshootingLog in as the Access Points administrator Access Point Account49 Administration Security Monitor Account Classification Administrative Functions in the Wireless Network MonitorAP Classification ClassificationTrusted MAC Addresses Advanced SettingsAllowed Vendor List Configuration Security Monitor Allowed Channel ConfigurationChannel Usage Client Inventory AP InventoryAlerts Summary AlertAlert Details Alert List18 Security Monitor Alert Advice AdviceDisassociation attacking Alert Description Advice Legitimate AP Attacks or sniffing AP does not have any encryption Updated Client computers Ssid and MAC address 19 Security Monitor Windows Firewall Screen Windows FirewallCommon Problems and Solutions Appendix a TroubleshootingCan users turn off the pop-up alerts? Frequently Asked QuestionsWhat is the 802.11b standard? What is ISM band? What is WEP? Windows XP Wireless Zero Configuration Appendix B Windows XP Wireless Zero ConfigurationFigure B-4 Available Wireless Network Figure B-6 Network Connection Wireless Security Security Precautions Appendix C Wireless SecuritySecurity Threats Facing Wireless Networks Appendix C Wireless Security Wireless-G Business USB Network Adapter with RangeBooster Shared Resources Appendix D Windows HelpNetwork Neighborhood/My Network Places Appendix E Glossary Wireless-G Business USB Network Adapter with RangeBooster Wireless-G Business USB Network Adapter with RangeBooster Wireless-G Business USB Network Adapter with RangeBooster Wireless-G Business USB Network Adapter with RangeBooster Appendix F Specifications Operating Temp Unit Weight 15 oz 0.061 kg CertificationsStorage Temp Operating HumidityLimited Warranty Appendix G Warranty InformationFCC Statement Appendix H Regulatory InformationWireless-N Notebook Adapter Dual-Band Wireless-N Notebook Adapter Dual-Band Wireless-N Notebook Adapter Dual-Band Wireless-N Notebook Adapter Dual-Band Wireless-N Notebook Adapter Wireless-N Notebook Adapter Appendix I Contact Information