1 |
Cyber Security Suite
The operation and management of an enterprise is becoming increasingly dependent on electronic information flow. An accompanying concern becomes the security of the communication infrastructure and the security of the data itself. The following table profiles security risks and how the TranSphere TS Wireless provides a solution for minimizing vulnerability.
Security Risk |
| The TranSphere TS Wireless Solution | |
Unauthorized access to the backbone | ▪ | Approved Remotes List | |
network through a foreign remote |
| Only radios on the Approved Remotes list connect | |
radio | ▪ |
| |
“Rogue” AP, where a foreign AP | Approved AP List | ||
takes control of some or all Remote |
| A Remote connects only to APs on its Approved AP | |
radios and thus remote devices | ▪ | List | |
“Dictionary attacks”, where an intruder | Failed | ||
runs a program that sequentially tries |
| After three tries, a transceiver ignores | |
to break a password |
| requests for five minutes. Critical event reports | |
| ▪ | (traps) are generated as well. | |
Denial of service, where Remote | Remote | ||
radios could be reconfigured with bad | ▪ | Local console | |
parameters, bringing the network | ▪ HTTP (Hypertext Transfer Protocol) and Telnet | ||
down | |||
| disabled, enabling only local management | ||
|
|
▪services
Airsnort and other | ▪ | |
intruders in parking lots, near |
| not talk over the air with standard 802.11b cards |
buildings, etc. | ▪ | The transceiver cannot be put in a “promiscuous” |
|
| mode |
▪Proprietary data framing
Eavesdropping, intercepting | ▪ |
messages |
|
Key cracking | ▪ Automatic Key Rotation algorithm. In addition, a |
| Force Key Rotation command is available to |
| immediately rotate the keys of the AP and |
| synchronize all Remotes with it. |
Replaying messages | ▪ |
Unprotected access to configuration | ▪ |
via SNMP | or disabled at will. |
▪NMPv3 password protection
Potential, ongoing attacks | ▪ Provides early warning via SNMP through critical |
| event reports of unauthorized |
| suspicious activities |
| Chapter 1 Introduction |