Uploaded by dessie asrie

WLAN Security Hardening Guide

advertisement
WLAN
Security Hardening Guide
Issue
07
Date
2021-08-30
HUAWEI TECHNOLOGIES CO., LTD.
Copyright © Huawei Technologies Co., Ltd. 2022. All rights reserved.
No part of this document may be reproduced or transmitted in any form or by any means without prior
written consent of Huawei Technologies Co., Ltd.
Trademarks and Permissions
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective
holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and
the customer. All or part of the products, services and features described in this document may not be
within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements,
information, and recommendations in this document are provided "AS IS" without warranties, guarantees
or representations of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.
Huawei Technologies Co., Ltd.
Address:
Huawei Industrial Base
Bantian, Longgang
Shenzhen 518129
People's Republic of China
Website:
https://e.huawei.com
Issue 07 (2021-08-30)
Copyright © Huawei Technologies Co., Ltd.
i
WLAN
Security Hardening Guide
Preface
Preface
Purpose
This document describes the policies for hardening network and WLAN security in
terms of attack behavior, security policies, and configuration methods. It also
provides hardening guidance in terms of the management, control, and
forwarding planes.
Intended Audience
This document is intended for network engineers responsible for WLAN
configuration and management. You should be familiar with basic Ethernet
knowledge and have extensive experience in network deployment and
management.
Symbol Conventions
The symbols that may be found in this document are defined as follows.
Symbol
Description
Indicates a potentially hazardous
situation which, if not avoided, could
result in equipment damage, data loss,
performance deterioration, or
unanticipated results.
NOTICE is used to address practices
not related to personal injury.
Supplements the important
information in the main text.
NOTE is used to address information
not related to personal injury,
equipment damage, and environment
deterioration.
Issue 07 (2021-08-30)
Copyright © Huawei Technologies Co., Ltd.
ii
WLAN
Security Hardening Guide
Contents
Contents
Preface........................................................................................................................................... ii
1 Overview....................................................................................................................................1
1.1 Security Isolation and Defense Mechanisms................................................................................................................. 1
1.2 Security Hardening Principles............................................................................................................................................. 2
1.3 Security Hardening Policy Levels....................................................................................................................................... 3
2 (Mandatory) Level-1 Security Hardening Policies...........................................................4
2.1 Default Accounts and Passwords....................................................................................................................................... 4
2.2 Management Plane................................................................................................................................................................ 4
2.2.1 Device Login Security......................................................................................................................................................... 4
2.2.1.1 Login Through the Console Port................................................................................................................................. 4
2.2.1.2 Login Through SSH.......................................................................................................................................................... 6
2.2.1.3 Login Through the Web NMS...................................................................................................................................... 7
2.2.2 AAA User Management Security.................................................................................................................................... 9
2.2.3 SNMP Device Management Security............................................................................................................................ 9
2.2.4 Service Plane Access Prohibition of Insecure Management Protocols............................................................ 11
2.3 Control Plane.......................................................................................................................................................................... 11
2.3.1 Wireless User Access Security....................................................................................................................................... 11
2.3.1.1 WPA/WPA2....................................................................................................................................................................... 11
2.3.1.2 WPA3.................................................................................................................................................................................. 13
2.3.1.3 WAPI................................................................................................................................................................................... 14
2.3.1.4 STA Blacklist and Whitelist......................................................................................................................................... 16
2.3.1.5 PMF..................................................................................................................................................................................... 17
2.3.1.6 Brute-Force Attack Defense and Dynamic Blacklist...........................................................................................17
2.3.2 Local Attack Defense........................................................................................................................................................ 19
2.3.3 Attack Defense Through Service and Management Isolation........................................................................... 20
2.3.4 Attack Defense................................................................................................................................................................... 22
2.3.4.1 Defense Against Malformed Packet Attacks........................................................................................................ 22
2.3.4.2 Defense Against Fragment Attacks..........................................................................................................................23
2.3.4.3 Defense Against TCP SYN Flood Packets............................................................................................................... 24
2.3.4.4 Defense Against UDP Flood Attacks....................................................................................................................... 24
2.3.4.5 Defense Against ICMP Flood Attacks...................................................................................................................... 25
2.4 Forwarding Plane.................................................................................................................................................................. 25
Issue 07 (2021-08-30)
Copyright © Huawei Technologies Co., Ltd.
iii
WLAN
Security Hardening Guide
Contents
2.4.1 Traffic Suppression............................................................................................................................................................ 25
2.4.2 Trusted Path-based Forwarding................................................................................................................................... 26
3 (Optional) Level-2 Security Hardening Policies............................................................ 27
3.1 Management Plane.............................................................................................................................................................. 27
3.1.1 Information Center Security.......................................................................................................................................... 27
3.1.2 CAPWAP Control Tunnel Encryption........................................................................................................................... 28
3.2 Control Plane.......................................................................................................................................................................... 28
3.2.1 Wireless Attack Detection and Containment...........................................................................................................28
3.2.2 URL Filtering........................................................................................................................................................................30
3.2.3 Intrusion Prevention......................................................................................................................................................... 30
3.2.4 Antivirus................................................................................................................................................................................ 31
3.2.5 ARP Security........................................................................................................................................................................ 33
3.2.5.1 Defense Against ARP Spoofing Attacks.................................................................................................................. 33
3.2.5.2 Defense Against ARP Flood Attacks........................................................................................................................ 35
3.2.6 DHCP Security.....................................................................................................................................................................37
3.2.6.1 Defense Against Bogus DHCP Server Attacks...................................................................................................... 37
3.2.6.2 Defense Against DHCP Flood Attacks.....................................................................................................................38
3.2.7 Routing Protocol Security............................................................................................................................................... 39
3.2.7.1 BGP/BGP4+....................................................................................................................................................................... 39
3.2.7.2 OSPF/OSPFv3.................................................................................................................................................................. 41
3.2.7.3 RIP/RIPng.......................................................................................................................................................................... 43
3.2.7.4 IS-IS (IPv4)/IS-IS (IPv6)................................................................................................................................................ 44
3.2.8 Multicast Security.............................................................................................................................................................. 45
3.2.8.1 Layer 2 Multicast............................................................................................................................................................ 45
3.2.8.2 Layer 3 Multicast............................................................................................................................................................ 46
3.3 Forwarding Plane.................................................................................................................................................................. 47
3.3.1 ACL......................................................................................................................................................................................... 47
3.3.2 MAC Address Anti-flapping............................................................................................................................................49
3.3.3 Port Isolation....................................................................................................................................................................... 50
3.3.4 Port Security and Trusted Port...................................................................................................................................... 51
3.3.5 Navi AC................................................................................................................................................................................. 52
3.3.6 CAPWAP Data Tunnel Encryption................................................................................................................................ 54
4 Reference Documents...........................................................................................................55
Issue 07 (2021-08-30)
Copyright © Huawei Technologies Co., Ltd.
iv
WLAN
Security Hardening Guide
1 Overview
1
Overview
About This Chapter
This document describes the policies for hardening network and WLAN security in
terms of attack behavior, security policies, and configuration methods. It also
provides hardening guidance in terms of the management, control, and
forwarding planes.
NOTE
This document is applicable to all product versions. The functions supported may vary
according to versions. For details, see the configuration guide.
1.1 Security Isolation and Defense Mechanisms
1.2 Security Hardening Principles
1.3 Security Hardening Policy Levels
1.1 Security Isolation and Defense Mechanisms
WLAN devices comply with the three-layer three-plane security isolation
mechanism of X.805. Figure 1-1 shows the security isolation architecture.
Data flows at different importance levels face different security threats that have
different impacts on users. To avoid mutual impacts between data flows, three
security planes are planned on WLAN devices.
●
Management plane: This plane focuses on the security of application and
service data for management users, that is, security of operation,
maintenance, and management information.
●
Control plane: WLAN devices must run various protocols to transmit service
traffic. The services must be protected against attacks or spoofing.
●
Forwarding plane: WLAN devices use the destination MAC and IP addresses of
packets to search for routes for forwarding the packets. Security measures
must be taken in the forwarding routes to prevent attacks on WLAN devices
and spreading of attack traffic over the IP network.
Issue 07 (2021-08-30)
Copyright © Huawei Technologies Co., Ltd.
1
WLAN
Security Hardening Guide
1 Overview
By isolating the control, management, and forwarding planes, WLAN devices can
ensure that attacks on any of the planes do not affect other planes.
Figure 1-1 Three-layer three-plane security isolation architecture of X.805
1.2 Security Hardening Principles
Before performing security hardening on WLAN devices, get familiar with the
following information to well understand security hardening policies in this
document.
Security must be hardened continuously and can never be achieved once and
forever. Any attempt to achieve permanent security using a single policy or
through one-off security hardening configuration will fail.
Before carrying out security hardening procedures, perform the following steps:
1.
2.
3.
4.
Fully understand service requirements: Security is always service-oriented. An
appropriate security hardening policy can be developed only after the security
protection requirements of the service system are clearly understood.
Evaluate risks comprehensively: Analyze security threats to the service system,
identify weak points of the service system, balance the service system value
against security hardening costs, and comprehensively evaluate security risks.
Provide defense measures against unacceptable security risks. Treat
acceptable risks as remaining risks, and periodically review them throughout
the service system lifecycle to determine whether to reevaluate their risk
levels.
Design a security hardening solution: Based on the comprehensive risk
evaluation, design a solution that meets service requirements. Security is
ensured by design, but not configuration. Every security hardening engineer
should adequately understand this principle.
Implement security hardening policies: Before the implementation, evaluate
the policy impact on services to prevent service loss.
After security hardening is complete, continuous monitoring and maintenance on
the service system are required, which can help locate faults promptly, adjust
Issue 07 (2021-08-30)
Copyright © Huawei Technologies Co., Ltd.
2
WLAN
Security Hardening Guide
1 Overview
security hardening policies, and ensure that the policies have taken effect as
expected. To sum up, security hardening is a process requiring continuous
improvement.
1.3 Security Hardening Policy Levels
Based on network security requirements, security hardening policies for WLAN
devices can be classified into two levels.
●
Level 1: security hardening policies that must be configured
●
Level 2: enhanced security hardening policies which can be configured based
on service requirements
Issue 07 (2021-08-30)
Copyright © Huawei Technologies Co., Ltd.
3
WLAN
Security Hardening Guide
2
2 (Mandatory) Level-1 Security Hardening Policies
(Mandatory) Level-1 Security Hardening
Policies
About This Chapter
2.1 Default Accounts and Passwords
2.2 Management Plane
2.3 Control Plane
2.4 Forwarding Plane
2.1 Default Accounts and Passwords
The default username and password are available in WLAN Default Usernames
and Passwords (Enterprise Network or Carrier). If you have not obtained the
access permission of the document, see Help on the website to find out how to
obtain it.
2.2 Management Plane
2.2.1 Device Login Security
2.2.1.1 Login Through the Console Port
Attack Behavior
Console ports are physical interfaces. After an attacker accesses the console port
on a WLAN device, the WLAN device is exposed to the attacker, causing security
risks to the WLAN device. The attacker can damage the WLAN device even
without a user name and a password.
Issue 07 (2021-08-30)
Copyright © Huawei Technologies Co., Ltd.
4
WLAN
Security Hardening Guide
2 (Mandatory) Level-1 Security Hardening Policies
When the console port is used for login, a potential attacker may attempt to crack
the user name and password over network connections and obtain the system
administrator rights.
Security Policy
To defend against the preceding attack, configure the following security policies
on a WLAN device:
When a WLAN device is used for the first time, configure it through the console
port.
1.
Connect the DB9 connector of the console cable to the serial port of the PC.
During the startup of the WLAN device, press CTRL+B, use the preset
password to access the BootROM menu, and change the BootROM password.
2.
The device generates configurations. Change the console port login password
and record the new password.
By default, the console port uses non-authentication and has no user name or
password configured. After you connect a PC to the console port, start the
terminal emulation software on the PC, create a connection, set the
connected interface and communication parameters, and press Enter to log in
to the device. The system prompts you to configure a password and confirm
it. After the password is successfully configured, you can enter the CLI. To
ensure console port security, you are advised to change the authentication
mode for the console user interface to Authentication, Authorization and
Accounting (AAA) authentication and configure the correct user name and
password in the AAA view.
NOTE
● The default username and password are available in WLAN Default Usernames and
Passwords (Enterprise Network or Carrier). If you have not obtained the access
permission of the document, see Help on the website to find out how to obtain it.
● After the upgrade to V200R019C00 or later, you can access the BIOS menu only after
changing the default BIOS password.
● After the password for the user interface is set successfully during the first login,
properly keep the password. You must enter this password for authentication when you
relog in to the system in password authentication mode on this user interface.
Configuration Method
●
Change the BootROM password.
The display in the following example is for reference only, which may vary
according to the device version. The display on the actual device shall prevail.
When "Press CTRL+B to enter BIOS menu:" is displayed during the startup,
press Ctrl+B within 3 seconds to access the BootROM main menu. After you
enter the correct BootROM password, the following BootROM main menu is
displayed:
Press CTRL+B to enter BIOS menu: 1
Password:
Info: You are advised to change the password to ensure security.
BIOS Menu (Version: 072)
Issue 07 (2021-08-30)
Copyright © Huawei Technologies Co., Ltd.
5
WLAN
Security Hardening Guide
2 (Mandatory) Level-1 Security Hardening Policies
1. Boot with default mode
2. Enter serial submenu
3. Enter startup submenu
4. Enter ethernet submenu
5. Enter file system submenu
6. Modify BOOTROM password
7. Clear password for console user
8. Config HigMem to Flash Flag
9. Reboot
(Press CTRL+E to enter Diag menu)
Enter your choice(1-9): 6
// Change the password.
Confirm old password :
// Enter the old password.
Please enter new password :
// Enter the new password.
Please confirm new password : // Enter the new password again.
The password is changed successfully.
●
Configure AAA authentication.
Set the authentication mode of the console user interface to AAA
authentication. In the AAA view, set the user name admin1234 and password
to Helloworld@6789.
<HUAWEI> system-view
[HUAWEI] user-interface console 0
[HUAWEI-ui-console0] authentication-mode aaa
[HUAWEI-ui-console0] quit
[HUAWEI] aaa
[HUAWEI-aaa] local-user admin1234 password irreversible-cipher Helloworld@6789
[HUAWEI-aaa] local-user admin1234 service-type terminal
2.2.1.2 Login Through SSH
Attack Behavior
●
Brute-force password crack
An attacker attempts to access a WLAN device after obtaining the Secure
Shell (SSH) port number. When the device asks for authentication, the
attacker may crack the password to pass authentication and obtain the access
right.
●
Denial of service (DoS) attack
The SSH server supports a limited number of users. When the number of
login users reaches the upper limit, no more users can log in to the SSH
server. This situation may appear when users properly use the FTP server or
when the SSH server is attacked.
Security Policy
To defend against the preceding attacks, configure the following security policies
on a WLAN device:
●
Performing password authentication and public-key authentication
The SSH server supports password authentication and public-key
authentication. Only authenticated users can log in to a WLAN device and
enter the CLI.
●
Disabling the SSH server
When the SSH server is enabled, the socket service is enabled on the device.
In this case, the device is prone to scanning by attackers. Therefore, disable
the SSH server if it is not needed.
Issue 07 (2021-08-30)
Copyright © Huawei Technologies Co., Ltd.
6
WLAN
Security Hardening Guide
●
2 (Mandatory) Level-1 Security Hardening Policies
Changing the port number
By default, the SSH server uses port 22, which is a well-known port and prone
to scanning and attacks. Configure the SSH server to use a private port to
reduce the scanning and attack possibility.
●
Configuring an Access Control List (ACL)
In the user interface view, configure an ACL for Virtual Type Terminal (VTY)
channels to limit the client IP addresses that can be used for login.
Configuration Method
●
Configure password authentication or Rivest-Shamir-Adelman (RSA)
authentication.
–
Password authentication: Set the authentication mode of user testuser to
password authentication.
<HUAWEI> system-view
[HUAWEI] ssh user testuser authentication-type password
–
RSA authentication: Set the authentication mode of user testuser to RSA
authentication (using a key of 2048 bits or more).
<HUAWEI> system-view
[HUAWEI] ssh user testuser authentication-type rsa
●
Disable the SSH service.
NOTE
After the SSH service is disabled, you cannot log in to the device using STelnet.
Perform this operation only after confirming that the SSH service is not needed.
<HUAWEI> system-view
[HUAWEI] undo stelnet server enable
●
Change the SSH server port number (for example, to 55535).
●
Configure ACL 2000 to allow users with the source IP address of 10.1.1.1 to
log in to the WLAN device.
<HUAWEI> system-view
[HUAWEI] ssh server port 55535
<HUAWEI> system-view
[HUAWEI] acl 2000
[HUAWEI-acl-basic-2000] rule permit source 10.1.1.1 0
[HUAWEI-acl-basic-2000] quit
[HUAWEI] user-interface vty 14
[HUAWEI-ui-vty14] acl 2000 inbound // To prevent users with a specified IP address or IP address
segment from logging in to the WLAN device, specify inbound. To prevent a login user from logging
in to other WLAN devices, specify outbound.
[HUAWEI-ui-vty14] quit
2.2.1.3 Login Through the Web NMS
Attack Behavior
●
DoS attack
The web server supports a limited number of users. When the number of
login users reaches the upper limit, no more users can log in to the web
server. This situation may appear when users properly use the web server or
when the web server is attacked.
●
Slow connection attack
Content-Length with a large value is defined in the HTTP packet header,
which is the length of the packet's content. After committing the header, an
Issue 07 (2021-08-30)
Copyright © Huawei Technologies Co., Ltd.
7
WLAN
Security Hardening Guide
2 (Mandatory) Level-1 Security Hardening Policies
attacker does not send the packet body. After receiving Content-Length, the
web server waits for the rest content. Then the attacker remains the
connection and sends a large number of packets by transmitting a byte per 10
to 100 seconds to exhaust resources.
Once the web server is attacked, users may encounter various problems, such
as slow login, logout, frequent disconnection, and login failures.
Security Policy
To defend against the preceding attacks, configure the following security policies
on a WLAN device:
●
Performing AAA authentication
The web server supports AAA authentication. Only authenticated users can
log in to a WLAN device and enter the CLI. Users are required to enter the
user name, password, and randomly generated verification code for login,
reducing the password cracking possibility.
●
Disabling the web server
When the web server is enabled, the socket service is enabled on the WLAN
device. In this case, the device is prone to scanning by attackers. Therefore,
disable the web server if it is not needed.
●
Changing the port number
By default, the web server uses port 80, which is a well-known port and prone
to scanning and attacks. Configure the web server to use a private port to
reduce the scanning and attack possibility.
●
Configuring an ACL
In the system view, configure an ACL for the web server to limit the source IP
addresses that can be used for login.
●
Using HTTP over SSL (HTTPS)
HTTP over Secure Sockets Layer (SSL) provides secure transfer to protect
transmitted data against theft. Because HTTP has security risks, WLAN devices
from V200R005 allow for web Network Management System (NMS) login
using HTTPS.
Configuration Method
●
Configure AAA authentication.
Set the authentication mode to AAA authentication. In the AAA view, set the
user name to client001 and password to Helloworld@6789.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] local-user client001 password irreversible-cipher Helloworld@6789
[HUAWEI-aaa] local-user client001 privilege level 15
[HUAWEI-aaa] local-user client001 service-type http
●
●
●
Issue 07 (2021-08-30)
Disable the HTTP service.
<HUAWEI> system-view
[HUAWEI] undo http server enable
Change the port number of the web server to 55536.
<HUAWEI> system-view
[HUAWEI] http server port 55536
Configure ACL 2000 to allow only users with the source IP address of
10.10.10.1 to log in to the WLAN device through HTTP.
Copyright © Huawei Technologies Co., Ltd.
8
WLAN
Security Hardening Guide
2 (Mandatory) Level-1 Security Hardening Policies
<HUAWEI> system-view
[HUAWEI] acl 2000
[HUAWEI-acl-basic-2000] rule 5 permit source 10.10.10.1 0
[HUAWEI-acl-basic-2000] quit
[HUAWEI] http acl 2000
●
Configure HTTPS.
<HUAWEI> system-view
[HUAWEI] ssl policy userserver type server
[HUAWEI-ssl-policy-userserver] quit
[HUAWEI] http secure-server ssl-policy userserver
[HUAWEI] http secure-server enable
2.2.2 AAA User Management Security
Attack Behavior
An attack attempts to obtain system administrators' login access rights by
traversing key information, such as user names and passwords.
Security Policy
To defend against such common user name and password attack and cracking
attempts, configure the maximum number of authentication failures and the
authentication interval to prevent login of unauthorized users. Then users who fail
in authentication for the maximum number of times will be blocked for a period,
decreasing the attempt success rate and hardening WLAN device security.
Configuration Method
Enable local account locking. Set the authentication retry interval to 6 minutes,
maximum number of consecutive incorrect password attempts to 4, and account
locking period to 6 minutes.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] local-aaa-user wrong-password retry-interval 6 retry-time 4 block-time 6 // By default,
local account locking is enabled, the retry interval is 5 minutes, the maximum number of consecutive
incorrect password attempts is 3, and the account locking period is 5 minutes.
2.2.3 SNMP Device Management Security
Attack Behavior
Common Simple Network Management Protocol (SNMP) attacks are as follows:
●
An attacker obtains the rights of authorized users by modifying the source IP
address of sent packets to perform unauthorized management operations.
●
An attacker listens on the communication between the NMS and SNMP
agents to obtain information, such as user names, passwords, and community
names, therefore gaining unauthorized rights.
●
An attacker intercepts and then reorders, delays, or retransmits SNMP
messages to affect normal operations, until obtaining unauthorized access
rights.
Issue 07 (2021-08-30)
Copyright © Huawei Technologies Co., Ltd.
9
WLAN
Security Hardening Guide
2 (Mandatory) Level-1 Security Hardening Policies
Security Policy
SNMP is used to manage network devices and has three versions: SNMPv1,
SNMPv2c, and SNMPv3.
SNMPv1 and SNMPv2c have low security, and support ACL and view-based access
control model (VACM). Associate an ACL and a MIB view with a community name
to limit the NMSs and nodes that can access a WLAN device, enhancing system
security to some extent.
SNMPv3 supports the user-based security model (USM). By authenticating and
encrypting communication data, SNMPv3 resolves security issues, such as message
forging, tampering, and leakage.
NOTE
From V200R019C00, MD5 and DES are supported only when a weak-encryption-algorithm
plug-in is installed. From V200R020C10, SHA is supported only when a weak-encryptionalgorithm plug-in is installed.
For details about the plug-in, see section Weak-Encryption-Algorithm Plug-in Management
in the Configuration Guide.
Configuration Method
For the sake of security, you are advised to configure an SNMPv3 user requiring
authentication and encryption, use the SNMPv3 authentication and encryption
mode to manage the WLAN device, and associate an ACL and a MIB view with the
user to limit the user's access rights.
1.
Configure ACL 2001 to reject packets from 10.138.20.123 and allow packets
from 10.138.90.111.
<HUAWEI> system-view
[HUAWEI] acl 2001
[HUAWEI-acl-basic-2001] rule 5 deny source 10.138.20.123 0
[HUAWEI-acl-basic-2001] rule 10 permit source 10.138.90.111 0
[HUAWEI-acl-basic-2001] quit
2.
Configure a MIB view named iso-view to access nodes in the subtree of
whose root node is the International Organization for Standardization (ISO).
[HUAWEI] snmp-agent mib-view iso-view include iso
3.
Configure an SNMPv3 group named v3group, set the associated read, write,
and notify views to iso-view, and apply ACL 2001 to the SNMPv3 group to
filter users by user group.
[HUAWEI] snmp-agent group v3 v3group privacy read-view iso-view write-view iso-view notifyview iso-view acl 2001
4.
Configure an SNMPv3 user named v3user who belong to v3group. Set the
authentication mode of the user to sha2-256, authentication password to
hello1234, encryption mode to aes256, and encryption password to
hello2012. Apply ACL 2001 to the user to implement user-based and user
group-based filtering.
[HUAWEI] snmp-agent usm-user version v3
[HUAWEI] snmp-agent usm-user version v3
Please configure the authentication password
Enter Password:
Confirm password:
[HUAWEI] snmp-agent usm-user version v3
Please configure the privacy password (8-64)
Enter Password:
Confirm password:
Issue 07 (2021-08-30)
v3user group v3group acl 2001
v3user authentication-mode sha2-256
(8-64)
v3user privacy-mode aes256
Copyright © Huawei Technologies Co., Ltd.
10
WLAN
Security Hardening Guide
2 (Mandatory) Level-1 Security Hardening Policies
2.2.4 Service Plane Access Prohibition of Insecure
Management Protocols
Security Policy
Service interfaces on WLAN devices support management protocols by default,
and management protocols can be used to log in to the WLAN devices through
the dedicated management Ethernet port. If the customer network has planned a
management plane that manages devices only through the management Ethernet
port, you can prohibit device login using management protocols over service
interfaces.
Configuration Method
To prohibit service plane access using management protocols for a WLAN device
with a dedicated management Ethernet port, run the deny command in the
attack defense policy view to set the action on Telnet, SSH, HTTP, SNMP, FTP, and
ping (ICMP) packets sent to the CPU to discard.
<HUAWEI> system-view
[HUAWEI] cpu-defend policy 1
[HUAWEI-cpu-defend-policy-1] deny
[HUAWEI-cpu-defend-policy-1] deny
[HUAWEI-cpu-defend-policy-1] deny
[HUAWEI-cpu-defend-policy-1] deny
[HUAWEI-cpu-defend-policy-1] deny
[HUAWEI-cpu-defend-policy-1] deny
[HUAWEI-cpu-defend-policy-1] quit
[HUAWEI] cpu-defend-policy 1
packet-type
packet-type
packet-type
packet-type
packet-type
packet-type
telnet-client wired
ssh-client wired
http-client wired
snmp wired
ftp-client wired
icmp wired
2.3 Control Plane
2.3.1 Wireless User Access Security
Four WLAN security policies are available: Wired Equivalent Privacy (WEP), Wi-Fi
Protected Access (WPA), WPA2, WPA3, and WLAN Authentication and Privacy
Infrastructure (WAPI). WEP uses a shared key to authenticate users and encrypt
service packets. Since the shared key is easy to decipher, the WEP security policy is
not recommended due to its low security.
WLAN devices support the STA blacklist and whitelist function to filter STAs based
on specified rules and ensure that only authorized STAs can access the WLAN,
preventing unauthorized STAs from accessing the WLAN.
2.3.1.1 WPA/WPA2
Security Policy
WEP shared key authentication uses the Rivest Cipher 4 (RC4) symmetric stream
cipher to encrypt data. Therefore, the same static key must be preconfigured on
the server and clients. Both the encryption mechanism and algorithm, however,
are prone to security threats. The Wi-Fi Alliance developed WPA to overcome WEP
defects. In addition to the RC4 algorithm, WPA defines the Temporal Key Integrity
Issue 07 (2021-08-30)
Copyright © Huawei Technologies Co., Ltd.
11
WLAN
Security Hardening Guide
2 (Mandatory) Level-1 Security Hardening Policies
Protocol (TKIP) encryption algorithm on the basis of WEP, uses the 802.1X identity
authentication framework, and supports Extensible Authentication ProtocolProtected Extensible Authentication Protocol (EAP-PEAP) and EAP-Transport Layer
Security (EAP-TLS) authentication. Later, 802.11i defined WPA2. WPA2 uses a more
secure encryption algorithm: Counter Mode with CBC-MAC Protocol (CCMP).
Both WPA and WPA2 support 802.1X access authentication and the TKIP or CCMP
encryption algorithm, giving better compatibility. With almost the same security
level, they mainly differ in the protocol packet format.
The WPA/WPA2 security policy involves four phases: link authentication, access
authentication, key negotiation, and data encryption.
Two authentication methods are available: WPA/WPA2-PSK authentication and
WPA/WPA2-802.1X authentication.
●
WPA/WPA2-PSK authentication
Both WPA and WPA2 support PSK authentication and the TKIP or AES
encryption algorithm. They have almost the same security level and mainly
differ in the protocol packet format.
WPA/WPA2-PSK authentication applies to individual, home, and Small Office
and Home Office (SOHO) networks that do not require high security. No
authentication server is required. If STAs support only WEP encryption, PSK
+TKIP can be implemented without a hardware upgrade, whereas PSK+AES
may be implemented only after a hardware upgrade.
●
WPA/WPA2-802.1X authentication
Both WPA and WPA2 support 802.1X authentication and the TKIP or AES
encryption algorithm. They have almost the same security level and mainly
differ in the protocol packet format.
WPA/WPA2-802.1X authentication applies to networks that require high
security, such as enterprise networks. An independent authentication server is
required. If STAs support only WEP encryption, 802.1X+TKIP can be
implemented without a hardware upgrade, whereas 802.1X+AES may be
implemented only after a hardware upgrade.
STAs vary and support different authentication and encryption modes. To enable
various types of STAs to access the network and facilitate management by
network administrators, configure both WPA and WPA2. If the security policy is
WPA-WPA2, STAs supporting WPA or WPA2 can be authenticated. If the
encryption mode is TKIP-AES, any STAs supporting TKIP or AES can encrypt service
packets.
Configuration Method
●
Configure WPA/WPA2-PSK authentication.
Configure WPA-WPA2, TKIP-AES, and PSK authentication.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] security-profile name p1
[HUAWEI-wlan-sec-prof-p1] security wpa-wpa2 psk pass-phrase abcdfffffg123 aes-tkip
●
Configure WPA/WPA2-802.1X authentication.
Configure WPA-WPA2, TKIP-AES, and 802.1X authentication.
<HUAWEI> system-view
[HUAWEI] wlan
Issue 07 (2021-08-30)
Copyright © Huawei Technologies Co., Ltd.
12
WLAN
Security Hardening Guide
2 (Mandatory) Level-1 Security Hardening Policies
[HUAWEI-wlan-view] security-profile name p1
[HUAWEI-wlan-sec-prof-p1] security wpa-wpa2 dot1x aes-tkip
2.3.1.2 WPA3
Security Policy
Compared with WPA and WPA2, WPA3 has the following improvements:
●
WPA3 introduces Simultaneous Authentication of Equals (SAE), which is a
more secure handshake protocol. Theoretically, SAE provides forward secrecy.
Even if an attacker knows the password on a network, the attacker cannot
decrypt the obtained traffic. A WPA2 network, however, is vulnerable to
password cracking attacks. That is, an attacker can decrypt obtained traffic
using the password. Therefore, the use of SAE makes WPA3 much more
secure than earlier WPA standards.
●
The algorithm strength is enhanced and support Suite B cryptography. That is,
WPA3 supports AES-GCM with a 256-bit key and 384-bit curve elliptic curve
encryption. GCM is short for Galois/Counter Mode.
Based on application scenarios and security requirements, there are two WPA3
modes: WPA3-Enterprise and WPA3-Personal, that is, WPA3-802.1X and WPA3SAE.
WPA3-Personal introduces the SAE handshake protocol. Compared with WPA/
WPA2-PSK authentication, WPA3-SAE can effectively defend against offline
dictionary attacks and mitigate brute force cracking posed by weak passwords. In
addition, the SAE handshake protocol provides forward secrecy. Even if an attacker
knows the password on the network, the attacker cannot decrypt the obtained
traffic, greatly improving the security of a WPA3-Personal network.
WPA3-Enterprise still uses the authentication system of WPA2-Enterprise and uses
the Extensible Authentication Protocol (EAP) for identity authentication. However,
WPA3 enhances the algorithm strength by replacing the original cryptography
suite with the Commercial National Security Algorithm (CNSA) Suite defined by
the Federal Security Service (FSS). The CNSA Suite has a powerful encryption
algorithm and applies to scenarios with extremely high security requirements.
WPA3-Enterprise supports Suite B, which uses 192-bit minimum-strength security
and supports Galois Counter Mode Protocol-256 (GCMP-256), Galois Message
Authentication Code-256 (GMAC-256), and SHA-384.
WPA2 is still widely used. To enable WPA3-incapable STAs to access a WPA3configured network, the Wi-Fi Alliance defines the WPA3 transition mode. That is,
WPA3 and WPA2 can coexist for a period of time in the future. This mode applies
only to WPA3-Personal.
For open Wi-Fi networks, the Wi-Fi Alliance proposes Opportunistic Wireless
Encryption (OWE) authentication based on open-system authentication of WPA3.
OWE authentication is a Wi-Fi Enhanced Open authentication mode that allows
for network access without the need to enter the password. In OWE
authentication mode, a device uses the AES encryption algorithm to encrypt data
on the network, thereby protecting data exchange between STAs and the Wi-Fi
network.
The process of OWE authentication is similar to that of SAE. The difference is that
OWE authentication eliminates the need for password maintenance. This
Issue 07 (2021-08-30)
Copyright © Huawei Technologies Co., Ltd.
13
WLAN
Security Hardening Guide
2 (Mandatory) Level-1 Security Hardening Policies
authentication mode uses the Diffie-Hellman protocol to exchange keys to
generate a PMK used for the subsequent four-way handshake. In addition to
retaining the convenience of open networks, OWE authentication ensures data
security for these networks.
The OWE transition mode provides backward compatibility with STAs that do not
support OWE authentication. That is, non-OWE STAs access the network in opensystem authentication mode, while OWE STAs access the network in OWE
authentication mode. The OWE transition mode supports only the AES encryption
mode.
In V200R019C00, ACs and APs support WPA3 authentication. In V200R019C10,
only ACs support WPA3 authentication.
OWE authentication is available since V200R020C10.
Configuration Method
●
Configure WPA3-SAE authentication and set the user password to
huawei@123.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] security-profile name p1
[HUAWEI-wlan-sec-prof-p1] security wpa3 sae pass-phrase huawei@123 aes
●
●
Configure the WPA3-802.1X authentication mode.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] security-profile name p1
[HUAWEI-wlan-sec-prof-p1] security wpa3 dot1x gcmp256
Configure WPA2-WPA3 authentication and set the user password to
huawei@123.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] security-profile name p1
[HUAWEI-wlan-sec-prof-p1] security wpa2-wpa3 psk-sae pass-phrase huawei@123 aes
●
●
Configure OWE authentication.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] security-profile name p1
[HUAWEI-wlan-sec-prof-p1] security enhanced-open aes
Set the authentication mode to the OWE transition mode and the SSID using
the open-system authentication mode to wlan-net.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] security-profile name p1
[HUAWEI-wlan-sec-prof-p1] security enhanced-open aes transition-ssid wlan-net
2.3.1.3 WAPI
Security Policy
WLAN Authentication and Privacy Infrastructure (WAPI) is a Chinese national
security standard for WLANs, which was developed based on IEEE 802.11. WAPI
provides higher security than WEP and WPA and consists of the following parts:
●
Issue 07 (2021-08-30)
WLAN Authentication Infrastructure (WAI): authenticates user identities and
manages keys.
Copyright © Huawei Technologies Co., Ltd.
14
WLAN
Security Hardening Guide
●
2 (Mandatory) Level-1 Security Hardening Policies
WLAN Privacy Infrastructure (WPI): protects data transmitted on WLANs and
provides the data encryption, data verification, and anti-replay functions.
WAPI uses the elliptic curve cryptography (ECC) algorithm based on the public-key
cryptography and the block cipher algorithm based on the symmetric-key
cryptography. The ECC algorithm is used for digital certificates, certificate
authentication, and key negotiation of wireless devices. The block cipher algorithm
is used to encrypt and decrypt data transmitted between wireless devices. The two
algorithms implement identity authentication, link authentication, access control,
and user information encryption.
Two authentication methods are available: WAPI-PSK authentication and WAPIcertificate authentication.
●
WAPI-PSK authentication
WAPI-PSK authentication applies to home networks or small-scale enterprise
networks. No additional certificate system is required.
●
WAPI-certificate authentication
WAPI-certificate authentication applies to large-scale enterprise networks or
carrier networks where expensive certificate systems need to be deployed and
maintained. WAPI uses X.509 V3 certificates encoded in Base64 binary mode
and saved in PEM format. The extension of an X.509 V3 certificate file is .cer.
Before importing a certificate for WAPI, ensure that the certificate file has
been stored in the root directory of the memory.
WAPI defines a dynamic key negotiation mechanism, but there are still security
risks if STAs use the same encryption key for a long time. WAPI provides the timebased key update mechanism. Both the Unicast Session Key (USK) and Multicast
Session Key (MSK) have a lifetime and need to be updated when the lifetime
ends.
Configuration Method
●
●
Issue 07 (2021-08-30)
Configure WAPI-PSK authentication.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] security-profile name p1
[HUAWEI-wlan-sec-prof-p1] security wapi psk pass-phrase testpassword123 // Set the
authentication method to PSK authentication and enter the key.
Configure WAPI-certificate authentication.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] security-profile name p1
[HUAWEI-wlan-sec-prof-p1] security wapi certificate // Set the authentication method to WAPIcertificate authentication.
[HUAWEI-wlan-sec-prof-p1] wapi import certificate ac format pem file-name flash:/ae.cer //
Load the AC certificate.
[HUAWEI-wlan-sec-prof-p1] wapi import certificate asu format pem file-name flash:/as.cer //
Load the ASU certificate.
[HUAWEI-wlan-sec-prof-p1] wapi import certificate issuer format pem file-name flash:/as.cer //
Load the issuer certificate.
[HUAWEI-wlan-sec-prof-p1] wapi import private-key format pem file-name flash:/ae.cer //
Import the AC private key file.
[HUAWEI-wlan-sec-prof-p1] wapi asu ip 10.164.10.10 // Set the IP address of the ASU server to
10.164.10.10.
Copyright © Huawei Technologies Co., Ltd.
15
WLAN
Security Hardening Guide
2 (Mandatory) Level-1 Security Hardening Policies
2.3.1.4 STA Blacklist and Whitelist
Security Policy
On a WLAN, a STA blacklist or whitelist can be configured to filter access requests
from STAs based on specified rules, allowing authorized STAs to access the WLAN
and rejecting unauthorized STAs.
●
STA whitelist
A STA whitelist contains MAC addresses of STAs that are allowed to connect
to a WLAN. After the STA whitelist function is enabled, only the STAs
matching the whitelist can connect to the WLAN.
●
STA blacklist
A STA blacklist contains MAC addresses of STAs that are not allowed to
connect to a WLAN. After the STA blacklist function is enabled, STAs matching
the blacklist cannot connect to the WLAN.
NOTE
If the STA whitelist or blacklist function is enabled but the whitelist or blacklist is empty, all
STAs can connect to the WLAN.
Configuration Method
Multiple STA whitelist and blacklist profiles can be configured on a WLAN device
and applied to different virtual access point (VAP) profiles or AP system profiles.
In a VAP profile or an AP system profile, either the STA whitelist profile or STA
blacklist profile takes effect at one time.
●
Configure a STA whitelist.
a.
b.
Configure a STA whitelist profile.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] sta-whitelist-profile name sta-whitelist-profile1 // Create a whitelist
profile named sta-whitelist-profile1.
[HUAWEI-wlan-whitelist-prof-sta-whitelist-profile1] sta-mac 2C27-D720-746B // Add the MAC
address of a STA.
[HUAWEI-wlan-whitelist-prof-sta-whitelist-profile1] quit
Apply the STA whitelist profile to a VAP profile or an AP system profile
based on site requirements.
▪
▪
●
Apply the STA whitelist profile to an AP system profile.
[HUAWEI-wlan-view] ap-system-profile name ap-system1 // Create an AP system
profile named ap-system1.
[HUAWEI-wlan-ap-system-prof-ap-system1] sta-access-mode whitelist sta-whitelistprofile1 // Bind the STA whitelist profile sta-whitelist-profile1 to the AP system profile
ap-system1.
Configure a STA blacklist.
a.
Issue 07 (2021-08-30)
Apply the STA whitelist profile to a VAP profile.
[HUAWEI-wlan-view] vap-profile name vap1 // Create a VAP profile named vap1.
[HUAWEI-wlan-vap-prof-vap1] sta-access-mode whitelist sta-whitelist-profile1 // Bind
the STA whitelist profile sta-whitelist-profile1 to the VAP profile vap1.
Configure a STA blacklist profile.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] sta-blacklist-profile name sta-blacklist-profile1 // Create a blacklist
Copyright © Huawei Technologies Co., Ltd.
16
WLAN
Security Hardening Guide
2 (Mandatory) Level-1 Security Hardening Policies
profile named sta-blacklist-profile1.
[HUAWEI-wlan-blacklist-prof-sta-blacklist-profile1] sta-mac 3C27-D720-746B // Add the MAC
address of a STA.
[HUAWEI-wlan-blacklist-prof-sta-blacklist-profile1] quit
b.
Apply the STA whitelist profile to a VAP profile or an AP system profile
based on site requirements.
▪
▪
Apply the STA whitelist profile to a VAP profile.
[HUAWEI-wlan-view] vap-profile name vap1 // Create a VAP profile named vap1.
[HUAWEI-wlan-vap-prof-vap1] sta-access-mode blacklist sta-blacklist-profile1 // Bind
the STA blacklist profile sta-blacklist-profile1 to the VAP profile vap1.
Apply the STA whitelist profile to an AP system profile.
[HUAWEI-wlan-view] ap-system-profile name ap-system1 // Create an AP system
profile named ap-system1.
[HUAWEI-wlan-ap-system-prof-ap-system1] sta-access-mode blacklist sta-blacklistprofile1 // Bind the STA blacklist profile sta-blacklist-profile1 to the AP system profile
ap-system1.
2.3.1.5 PMF
Attack Behavior
If management frames are not encrypted on a WLAN, security problems may be
generated.
Security Policy
The Protected Management Frames (PMF) standard is released by Wi-Fi Alliance
based on IEEE 802.11w. It aims to apply security measures defined in WPA2 to
unicast and multicast management action frames to improve network
trustworthiness.
Deploying PMF can solve the following attacks:
●
Hackers intercept management frames exchanged between APs and STAs.
●
Hackers forge APs and send Disassociation and Deauthentication frames to
disconnect STAs.
●
Hackers forge STAs and send Disassociation frames to APs to disconnect the
STAs.
Configuration Method
Configure PMF in mandatory mode to allow only PMF-supported STAs to access
the network.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] security-profile name p1
[HUAWEI-wlan-sec-prof-p1] security wpa2 psk pass-phrase abcdfffffg aes
[HUAWEI-wlan-sec-prof-p1] pmf mandatory
2.3.1.6 Brute-Force Attack Defense and Dynamic Blacklist
Attack Behavior
During a brute force attack, the attacker searches for a password by trying to use
all possible password combinations. This method is also called the exhaustive
Issue 07 (2021-08-30)
Copyright © Huawei Technologies Co., Ltd.
17
WLAN
Security Hardening Guide
2 (Mandatory) Level-1 Security Hardening Policies
attack method. For example, a password that contains only 4 digits may have a
maximum of 10,000 combinations. Therefore, the password can be decrypted after
a maximum of 10,000 attempts. Theoretically, the brute force method can decrypt
any password. Attackers, however, are always looking for ways to shorten the time
required to decrypt passwords. When a WLAN uses WPA/WPA2-PSK, WAPI-PSK, or
WEP-Shared-Key as the security policy, attackers can use the brute force method
to decrypt the password.
Security Policy
Defense against brute-force key cracking can prolong the time needed to decrypt
passwords. An AP checks whether the number of key negotiation failures during
WPA/WPA2-PSK, WAPI-PSK, or WEP-Shared-Key authentication exceeds the
configured threshold. If the threshold is exceeded, the AP considers that the user is
using the brute force method to decrypt the password and reports an alarm to the
AC. If the dynamic blacklist function is enabled, the AP adds the user to the
dynamic blacklist and discards all the packets of the user until the dynamic
blacklist entry is aged.
Configuration Method
Set the maximum number of key negotiation failures allowed within a brute-force
key cracking attack detection period (100 seconds) to 60. Enable the dynamic
blacklist function so that when the number of key negotiation failures from a user
exceeds 60, the user is added to the blacklist.
In V200R019C00 and earlier versions:
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-group name office
[HUAWEI-wlan-ap-group-office] radio 0
[HUAWEI-wlan-group-radio-office/0] wids attack detect enable wpa-psk
[HUAWEI-wlan-group-radio-office/0] wids attack detect enable wpa2-psk
[HUAWEI-wlan-group-radio-office/0] wids attack detect enable wapi-psk
[HUAWEI-wlan-group-radio-office/0] wids attack detect enable wep-share-key
[HUAWEI-wlan-group-radio-office/0] quit
[HUAWEI-wlan-ap-group-office] quit
[HUAWEI-wlan-view] wids-profile name default
[HUAWEI-wlan-wids-prof-default] brute-force-detect interval 100
[HUAWEI-wlan-wids-prof-default] brute-force-detect threshold 60
[HUAWEI-wlan-wids-prof-default] dynamic-blacklist enable
In versions later than V200R019C00:
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-group name office
[HUAWEI-wlan-ap-group-office] radio 0
[HUAWEI-wlan-group-radio-office/0] wids attack detect wpa-psk enable
[HUAWEI-wlan-group-radio-office/0] wids attack detect wpa2-psk enable
[HUAWEI-wlan-group-radio-office/0] wids attack detect wapi-psk enable
[HUAWEI-wlan-group-radio-office/0] wids attack detect wep-share-key enable
[HUAWEI-wlan-group-radio-office/0] quit
[HUAWEI-wlan-ap-group-office] quit
[HUAWEI-wlan-view] wids-profile name default
[HUAWEI-wlan-wids-prof-default] brute-force-detect interval 100
[HUAWEI-wlan-wids-prof-default] brute-force-detect threshold 60
[HUAWEI-wlan-wids-prof-default] undo dynamic-blacklist disable
Issue 07 (2021-08-30)
Copyright © Huawei Technologies Co., Ltd.
18
WLAN
Security Hardening Guide
2 (Mandatory) Level-1 Security Hardening Policies
2.3.2 Local Attack Defense
Attack Behavior
The CPU of a device needs to process a large number of packets including valid
packets and malicious attack packets on a network. If the malicious attack packets
overwhelm the CPU, services will be affected and the system will break down. In
addition, excessive valid packets can also lead to high CPU usage, which degrades
the CPU's performance and interrupts services.
Security Policy
To ensure that CPUs process services properly, WLAN devices provide the local
attack defense function. When a device is undergoing an attack, this function
ensures uninterrupted service transmission and minimizes the impact on network
services.
Local attack defense falls into CPU attack defense and attack source tracing.
●
CPU attack defense
CPU attack defense can limit the rate of packets sent to the CPU so that only
a limited number of packets are sent to the CPU within a certain period of
time. This ensures that the CPU can properly process services.
The core of CPU attack defense is Control Plane Committed Access Rate
(CPCAR). CPCAR limits the rate of protocol packets sent to the control plane
to ensure security of the control plane.
●
Attack source tracing
Attack source tracing defends against denial of service (DoS) attacks. The
device enabled with attack source tracing analyzes packets sent to the CPU,
collects statistics about the packets, and specifies a threshold for the packets.
Excess packets are considered to be attack packets. The device finds the
source user address or source interface of the attack by analyzing the attack
packets and generates logs or alarms. Accordingly, the network administrator
can take measures to defend against the attacks or configure the device to
discard packets from the attack source.
Configuration Method
●
Modify the CPCAR value of protocol packets.
NOTE
Improper CPCAR settings will affect services on your network. To adjust the CPCAR
values, contact technical support personnel.
Decrease the CPCAR value of protocol packets or set the CPCAR action to
deny to prevent packets that have low priorities or do not need to be
processed from being sent to the CPU, ensuring proper system running.
Configure the rate limit for ARP Request packets sent to the CPU. This limits
the rate of ARP Request packets within a small rate range, and thereby
reduces the impact on CPU processing of normal services.
<HUAWEI> system-view
[HUAWEI] cpu-defend policy 1
[HUAWEI-cpu-defend-policy-1] packet-type arp-request rate-limit 80 wired
Issue 07 (2021-08-30)
Copyright © Huawei Technologies Co., Ltd.
19
WLAN
Security Hardening Guide
2 (Mandatory) Level-1 Security Hardening Policies
[HUAWEI-cpu-defend-policy-1] packet-type arp-request rate-limit 80 wireless
[HUAWEI-cpu-defend-policy-1] quit
[HUAWEI] cpu-defend-policy 1
●
Configure attack source tracing to automatically detect the attack source and
defend against attack traffic.
Attack source tracing allows devices to automatically detect the attack source
and defend against attack traffic, improving network running security. When
an attack occurs, the attack source can be isolated to reduce attack impact on
services.
Configure a device to consider ARP packets with a rate higher than 50 pps as
attack packets and automatically punish users sending the packets.
<HUAWEI> system-view
[HUAWEI] cpu-defend policy 1
[HUAWEI-cpu-defend-policy-1] auto-defend
[HUAWEI-cpu-defend-policy-1] auto-defend
[HUAWEI-cpu-defend-policy-1] auto-defend
[HUAWEI-cpu-defend-policy-1] auto-defend
[HUAWEI-cpu-defend-policy-1] auto-defend
[HUAWEI-cpu-defend-policy-1] quit
[HUAWEI] cpu-defend-policy 1
enable
threshold 50
trace-type source-ip source-mac source-portvlan
protocol arp
action deny timer 300
2.3.3 Attack Defense Through Service and Management
Isolation
Attack Behavior
As shown in Figure 2-1, devices on the 192.168.10.X network segment are
connected to the independent management Ethernet port on the WLAN device,
and devices on the 192.168.20.X network segment are connected to the service
interface GE1/0/0 on the WLAN device. They can access the switch properly.
If the management interface is not isolated, the devices on 192.168.20.X can ping
devices on 192.168.10.X. As a result, the management interface address is leaked
and vulnerable to attacks.
Figure 2-1 Networking diagram
Security Policy
To improve network security and prevent attacks from unauthorized users, you
can configure interface policies and routing policies for the management interface
and service interfaces to isolate them.
To prevent STAs from accessing the device through Telnet and isolate the service
plane from the management plane, configure security protection.
Issue 07 (2021-08-30)
Copyright © Huawei Technologies Co., Ltd.
20
WLAN
Security Hardening Guide
2 (Mandatory) Level-1 Security Hardening Policies
Configuration Method
●
Configure interface policies.
–
For devices with a management interface, for example, Meth0/0/1 on an
AC6605, configure isolation of the management plane and management
interface.
<HUAWEI> system-view
[HUAWEI] management-port isolate enable
[HUAWEI] management-plane isolate enable
–
For devices without a management interface, for example, an AC6005,
configure interface policies for the management protocol. The
management protocol takes effect only on the management interface.
For example, Telnet, SSH, FTP, or HTTP allows users to access the device
only through GE0/0/1 but not through other interfaces.
<HUAWEI> system-view
[HUAWEI] telnet server permit interface gigabitethernet 0/0/1
[HUAWEI] ssh server permit interface gigabitethernet 0/0/1
[HUAWEI] ftp server permit interface gigabitethernet 0/0/1
[HUAWEI] http server permit interface gigabitethernet 0/0/1
–
If the device is managed through a VLANIF interface, configure the
VLANIF interface as a management interface to implement triple-plane
isolation. After a VLANIF interface is specified as a management
interface, you can only manage the device through the specified VLANIF
interface but not through other VLANIF interfaces.
Versions earlier than V200R010C00:
<HUAWEI> system-view
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] management-interface
V200R010C00 and later versions:
<HUAWEI> system-view
[HUAWEI] mgmt isolate disable //Only the AC6805, AC6605, AirEngine 9700-M, and ACU2
support this function. You do not need run this command on other models.
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] management-interface
●
Configure a routing policy.
Configure the management IP address and service IP addresses on different
network segments. Configure a routing policy to prevent routes of the
management IP address from being advertised to external networks through
service interfaces.
For example, on a network running OSPF, the AC receives routes from
upstream service interfaces and advertises the routes only through the service
interfaces. The IP address segments are as follows:
–
Upstream service interface VLANIF 10: 10.1.1.1/24
–
Downstream service interface VLANIF 20: 10.1.2.1/24
–
Management interface VLANIF 100: 10.2.1.1/24
Configure a routing policy to prevent the network segment of the
management interface from being advertised to the upstream network.
<HUAWEI> system-view
[HUAWEI] ip ip-prefix a2b index 10 deny 10.2.1.0 24
[HUAWEI] ospf
[HUAWEI-ospf-1] filter-policy ip-prefix a2b export
●
Configure security defense.
–
Issue 07 (2021-08-30)
If AAA local authentication is used to authenticate service users, the
access type of users must be 8021X or web.
Copyright © Huawei Technologies Co., Ltd.
21
WLAN
Security Hardening Guide
2 (Mandatory) Level-1 Security Hardening Policies
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] local-user user1@vipdomain service-type 8021x web
–
If AAA remote authentication is used to authenticate service users, for
example, RADIUS authentication, set the user access type on the RADIUS
authentication server not to a management access protocol, including
FTP, HTTP, SSH, Telnet, and terminal.
–
You can also configure local attack defense to discard management
packets from the wireless side and isolate wireless services from the
management layer. Note that wireless services need to be configured
with tunnel forwarding, and Portal authentication cannot be used in the
user authentication policy.
<HUAWEI> system-view
[HUAWEI] cpu-defend policy test
[HUAWEI-cpu-defend-policy-test] deny
[HUAWEI-cpu-defend-policy-test] deny
[HUAWEI-cpu-defend-policy-test] deny
[HUAWEI-cpu-defend-policy-test] deny
[HUAWEI-cpu-defend-policy-test] deny
[HUAWEI-cpu-defend-policy-test] deny
[HUAWEI-cpu-defend-policy-test] quit
[HUAWEI] cpu-defend-policy test
packet-type
packet-type
packet-type
packet-type
packet-type
packet-type
ftp-client wireless
http-client wireless
https-client wireless
ssh-client wireless
telnet-client wireless
snmp wireless
2.3.4 Attack Defense
Attack defense is an important network security feature that enables WLAN
devices to analyze the content and behavior of packets sent to CPUs, identify
packets with attack characteristics, and take defense measures on these packets.
Attack defense can defend against malformed packet attacks, fragment attacks,
and flood attacks.
2.3.4.1 Defense Against Malformed Packet Attacks
Attack Behavior
In a malformed packet attack, the attacker sends defective IP packets to the target
WLAN device. The target WLAN device may encounter errors or crash when
handling such packets.
Malformed packet attacks are classified into the following types:
●
Flood attack without IP payload
●
IGMP null packet attack
●
Local Area Network Denial (LAND) attack
●
Smurf attack
●
Invalid TCP flag attack
Security Policy
A WLAN device may break down in the case of malformed packet attacks. To
prevent this situation and ensure non-stop network services, configure defense
against malformed packet attacks on the WLAN device. WLAN devices enabled
with the defense function can identify and discard malformed packets.
Issue 07 (2021-08-30)
Copyright © Huawei Technologies Co., Ltd.
22
WLAN
Security Hardening Guide
2 (Mandatory) Level-1 Security Hardening Policies
Configuration Method
Enable defense against malformed packet attacks. By default, the function is
enabled.
<HUAWEI> system-view
[HUAWEI] anti-attack abnormal enable
2.3.4.2 Defense Against Fragment Attacks
Attack Behavior
An attacker sends error packet fragments to a WLAN device, which consume a
large number of CPU resources.
Fragment attacks are classified into the following types:
●
Excess-fragment attack
●
Excess-offset attack
●
Repeated fragment attack
●
Teardrop attack
●
Syndrop attack
●
Newtear attack
●
Bonk attack
●
Nesta attack
●
Rose attack
●
Fawx Attack
●
Ping of death attack
●
Jolt attack
Security Policy
A WLAN device may break down in the case of fragment attacks. To prevent this
situation and ensure non-stop network services, configure defense against
fragment attacks on the WLAN device. The device enabled with the defense
function can limit the rate of fragmented packets to ensure that the CPU runs
properly when fragment attacks are launched.
Configuration Method
Enable defense against fragment attacks. By default, the function is enabled.
<HUAWEI> system-view
[HUAWEI] anti-attack fragment enable
[HUAWEI] anti-attack fragment car cir 8000 // Limit the rate of receiving fragmented packets. By
default, this rate is 155,000,000 bit/s.
Issue 07 (2021-08-30)
Copyright © Huawei Technologies Co., Ltd.
23
WLAN
Security Hardening Guide
2 (Mandatory) Level-1 Security Hardening Policies
2.3.4.3 Defense Against TCP SYN Flood Packets
Attack Behavior
TCP SYN flood attacks are often used. They are DoS attacks, depending on the
establishment method of TCP connections.
An attacker sends a SYN packet to a WLAN device but does not respond to the
SYN-ACK packet from the WLAN device. The WLAN device, however, keeps waiting
for an ACK packet from the attacker. As a result, a half-connection is generated.
The attacker keeps sending SYN packets to set up a large number of halfconnections, wasting considerable resources of the WLAN device.
Security Policy
To prevent TCP SYN flood attacks, enable defense against TCP SYN flood attacks
and set a rate limit for TCP SYN packets. This prevents system resources from
being exhausted when TCP SYN flood attacks occur.
Configuration Method
Enable defense against TCP SYN flood attacks. By default, this function is enabled.
<HUAWEI> system-view
[HUAWEI] anti-attack tcp-syn enable
[HUAWEI] anti-attack tcp-syn car cir 8000 // Limit the rate of receiving TCP SYN packets. By default, this
rate is 155,000,000 bit/s.
2.3.4.4 Defense Against UDP Flood Attacks
Attack Behavior
●
Fraggle attack
Attackers use UDP port 7 to launch Fraggle attacks. Similar to ICMP echo,
port 7 sends back the original received packet payload to test the network
connection between the source and destination. Fraggle attacks work similarly
to Smurf attacks. In a Fraggle attack, the IP address of the attacked device is
spoofed as the source IP address, the destination IP address is a broadcast
address, the destination port is port 7, and the source port may be port 7 or
another port. If the UDP echo service is enabled on a lot of hosts on the
broadcast network, the attacked device will receive a large number of
response packets and get attacked.
●
UDP diagnosis port attack
If an attacker randomly sends a large number of packets to UDP diagnosis
ports (7-echo, 13-daytime, and 19-Chargen) simultaneously, a flood is caused,
and network devices may fail to work properly. Many vendors enable some
ports by default for network diagnosis or device management, which results
in potential attacks.
Security Policy
To prevent UDP flood attacks, configure defense against UDP flood attacks on
WLAN devices to enable them to discard UDP packets over ports 7, 13, and 19.
Issue 07 (2021-08-30)
Copyright © Huawei Technologies Co., Ltd.
24
WLAN
Security Hardening Guide
2 (Mandatory) Level-1 Security Hardening Policies
Configuration Method
Enable defense against UDP flood attacks. By default, this function is enabled.
<HUAWEI> system-view
[HUAWEI] anti-attack udp-flood enable
2.3.4.5 Defense Against ICMP Flood Attacks
Attack Behavior
An attacker sends a large number of ICMP Echo Request packets to a WLAN
device in a short period so that the WLAN device is busy responding to these
packets and fails to process normal services.
Security Policy
To prevent ICMP flood attacks, enable defense against ICMP flood attacks on
WLAN devices and set a rate limit for ICMP packets.
Configuration Method
Enable defense against ICMP flood attacks. By default, the function is enabled.
<HUAWEI> system-view
[HUAWEI] anti-attack icmp-flood enable
[HUAWEI] anti-attack icmp-flood car cir 8000 // Limit the rate of receiving ICMP flood attack packets. By
default, this rate is 155,000,000 bit/s.
2.4 Forwarding Plane
2.4.1 Traffic Suppression
Security Policy
When a Layer 2 Ethernet interface on a WLAN device receives broadcast,
multicast, or unknown unicast packets, the WLAN device forwards these packets
to other Layer 2 Ethernet interfaces in the same VLAN if the outbound interfaces
cannot be determined based on the destination MAC addresses of these packets.
In this case, a broadcast storm may occur, degrading forwarding performance of
the device.
Traffic suppression is used to control these packets and prevent broadcast storms.
Traffic suppression limits traffic based on the configured threshold.
Configuration Method
Configure traffic suppression on an interface.
To limit the rate of broadcast, multicast, or unknown unicast packets on an
interface and prevent broadcast storms, configure traffic suppression for packets
of these types on the interface.
Issue 07 (2021-08-30)
Copyright © Huawei Technologies Co., Ltd.
25
WLAN
Security Hardening Guide
2 (Mandatory) Level-1 Security Hardening Policies
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] broadcast-suppression packets 30
[HUAWEI-GigabitEthernet0/0/1] multicast-suppression packets 30
[HUAWEI-GigabitEthernet0/0/1] unicast-suppression packets 30
[HUAWEI-GigabitEthernet0/0/1] quit
2.4.2 Trusted Path-based Forwarding
Security Policy
Unicast Reverse Path Forwarding (URPF) searches the routing table for the route
to the source IP address of a packet and checks whether the inbound interface of
the packet is the same as the outbound interface of the route. If no route to the
source IP address exists in the routing table or the inbound interface of the packet
is different from the outbound interface of the route, URPF discards the packet to
prevent IP spoofing. The security policy is effective for DoS attacks with forged
source IP addresses.
Configuration Method
In a complex networking environment, asymmetric routes may exist. That is, the
routes recorded on the local and remote WLAN devices are different. URPFenabled WLAN devices may discard packets received through valid paths and
forward packets received through invalid paths. WLAN devices provide the
following URPF modes to resolve this problem:
●
Strict mode
In this mode, the route to the source IP address of a packet must exist in the
routing table, and the inbound interface of the packet must be the same as
the outbound interface of the route.
The strict mode is recommended if route symmetry is ensured. For example, if
there is only one path between two network edge WLAN devices, the strict
mode can help ensure network security.
●
Loose mode
In this mode, the route to the source IP address of a packet must exist in the
routing table, and the inbound interface of the packet can be the same as or
different from the outbound interface of the route.
The loose mode is recommended if route symmetry is not ensured. For
example, if there are multiple paths between two network edge WLAN
devices, the loose mode can help defend against network attacks and prevent
valid packets from being discarded.
Enable URPF in strict mode on VLANIF 100, and allow the route to the source IP
address of a packet to be the default route.
<HUAWEI> system-view
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] urpf strict allow-default-route
Issue 07 (2021-08-30)
Copyright © Huawei Technologies Co., Ltd.
26
WLAN
Security Hardening Guide
3
3 (Optional) Level-2 Security Hardening Policies
(Optional) Level-2 Security Hardening
Policies
About This Chapter
3.1 Management Plane
3.2 Control Plane
3.3 Forwarding Plane
3.1 Management Plane
3.1.1 Information Center Security
Security Policy
To query information generated on a remotely deployed WLAN device, configure
the WLAN device to export configuration information to a log host, so that you
can view device information on the log host. You can run the info-center loghost
command to configure the device to export configuration information to a log
host. To improve log transmission security, specify the ssl-policy policy-name
parameter in the info-center loghost command to configure TCP-based SSL
encryption.
Configuration Method
Configure a WLAN device to send information to a log host with the IPv4 address
192.168.2.2. Configure the device to transmit information in TCP mode and
encrypt packets using the SSL policy named huawei123.
<HUAWEI> system-view
[HUAWEI] ssl policy huawei123 type client
[HUAWEI-ssl-policy-huawei123] quit
[HUAWEI] info-center loghost 192.168.2.2 transport tcp ssl-policy huawei123
Issue 07 (2021-08-30)
Copyright © Huawei Technologies Co., Ltd.
27
WLAN
Security Hardening Guide
3 (Optional) Level-2 Security Hardening Policies
3.1.2 CAPWAP Control Tunnel Encryption
Security Policy
When an AP establishes a CAPWAP tunnel with an AC, you can configure CAPWAP
control tunnel encryption using Datagram Transport Layer Security (DTLS) to
ensure integrity and privacy of management packets. Currently, devices can
encrypt management packets only using the pre-shared key (PSK).
Configuration Method
Enable CAPWAP control tunnel encryption using DTLS and set the PSK for DTLS
encryption to huawei@123.
<HUAWEI> system-view
[HUAWEI] capwap dtls psk huawei@123
[HUAWEI] capwap dtls control-link encrypt
NOTE
From V200R021C00, the command format for enabling DTLS encryption is changed to
capwap dtls control-link encrypt on.
3.2 Control Plane
3.2.1 Wireless Attack Detection and Containment
Security Policy
WLANs are vulnerable to threats from unauthorized APs, STAs, and ad-hoc
networks. Huawei WLAN devices use the following technologies to detect and
contain rogue and interfering devices:
●
The Wireless Intrusion Detection System (WIDS) can detect rogue and
interfering APs, bridges, and STAs, as well as ad-hoc devices.
●
The Wireless Intrusion Prevention System (WIPS) can disconnect authorized
users from rogue APs, disconnect rogue and interfering devices from the
WLAN, and contain such devices.
The WIDS and WIPS can also detect attacks such as flood attacks, weak IV attacks,
spoofing attacks, brute force WPA/WPA2/WAPI PSK cracking, and brute force WEP
shared key cracking in a timely manner. The two systems then record logs,
statistics, and alarms to notify network administrators of such attacks. The WLAN
device adds devices that initiate flood attacks and brute force key cracking attacks
to the dynamic blacklist and rejects packets from such devices within the aging
time of the dynamic blacklist.
Configuration Method
Detect and contain the following rogue and interfering devices:
●
Rogue or interfering AP using open authentication
●
Rogue or interfering AP with a spoofing SSID
Issue 07 (2021-08-30)
Copyright © Huawei Technologies Co., Ltd.
28
WLAN
Security Hardening Guide
3 (Optional) Level-2 Security Hardening Policies
●
Rogue or interfering STA
●
Ad-hoc device
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-group name ap-group1
[HUAWEI-wlan-ap-group-ap-group1] radio 0
[HUAWEI-wlan-group-radio-ap-group1/0] work-mode normal
[HUAWEI-wlan-group-radio-ap-group1/0] wids device detect enable
[HUAWEI-wlan-group-radio-ap-group1/0] wids contain enable
[HUAWEI-wlan-group-radio-ap-group1/0] quit
[HUAWEI-wlan-view] wids-profile name default
[HUAWEI-wlan-wids-prof-default] contain-mode open-ap
[HUAWEI-wlan-wids-prof-default] contain-mode spoof-ssid-ap
[HUAWEI-wlan-wids-prof-default] contain-mode client
[HUAWEI-wlan-wids-prof-default] contain-mode adhoc
[HUAWEI-wlan-wids-prof-default] quit
[HUAWEI-wlan-view] ap-group name ap-group1
[HUAWEI-wlan-ap-group-ap-group1] wids-profile default
[HUAWEI-wlan-ap-group-ap-group1] quit
Configure attack detection and a dynamic blacklist. The device can detect flood
attacks, weak IV attacks, spoofing attacks, and brute force key cracking attacks,
and adds devices that initiate flood attacks and brute force key cracking attacks
into the dynamic blacklist.
In V200R019C00 and earlier versions:
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-group name ap-group1
[HUAWEI-wlan-ap-group-ap-group1] radio 0
[HUAWEI-wlan-group-radio-ap-group1/0] wids attack detect enable all
[HUAWEI-wlan-group-radio-ap-group1/0] quit
[HUAWEI-wlan-ap-group-ap-group1] quit
[HUAWEI-wlan-view] wids-profile name default
[HUAWEI-wlan-wids-prof-default] dynamic-blacklist enable
[HUAWEI-wlan-wids-prof-default] quit
[HUAWEI-wlan-view] ap-group name ap-group1
[HUAWEI-wlan-ap-group-ap-group1] wids-profile default
[HUAWEI-wlan-ap-group-ap-group1] quit
In V200R019C10:
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-group name ap-group1
[HUAWEI-wlan-ap-group-ap-group1] radio 0
[HUAWEI-wlan-group-radio-ap-group1/0] wids attack detect all enable
[HUAWEI-wlan-group-radio-ap-group1/0] quit
[HUAWEI-wlan-ap-group-ap-group1] quit
[HUAWEI-wlan-view] wids-profile name default
[HUAWEI-wlan-wids-prof-default] undo dynamic-blacklist disable
[HUAWEI-wlan-wids-prof-default] quit
[HUAWEI-wlan-view] ap-group name ap-group1
[HUAWEI-wlan-ap-group-ap-group1] wids-profile default
[HUAWEI-wlan-ap-group-ap-group1] quit
In versions later than V200R019C10:
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-group name ap-group1
[HUAWEI-wlan-ap-group-ap-group1] radio 0
[HUAWEI-wlan-group-radio-ap-group1/0] wids attack detect all enable
[HUAWEI-wlan-group-radio-ap-group1/0] quit
[HUAWEI-wlan-ap-group-ap-group1] quit
[HUAWEI-wlan-view] wids-profile name default
Issue 07 (2021-08-30)
Copyright © Huawei Technologies Co., Ltd.
29
WLAN
Security Hardening Guide
3 (Optional) Level-2 Security Hardening Policies
[HUAWEI-wlan-wids-prof-default] undo dynamic-blacklist disable
[HUAWEI-wlan-wids-prof-default] quit
3.2.2 URL Filtering
Attack Behavior
With the rapid development of Internet applications and the popularity of
computer networks, acquisition, sharing, and dissemination of information have
become more widespread than ever, which brings unprecedented threats to
enterprises.
●
Visiting non-work-related websites during working hours reduces work
efficiency.
●
Visiting illegitimate or malicious websites may result in confidential
information leakage or even threats such as worms, viruses, and Trojan
horses.
●
When the intranet is congested, employees may be unable to access workrelated websites, such as the company homepage and search engine,
deteriorating working efficiency.
Security Policy
When users send HTTP or HTTPS requests for accessing URLs, URL filtering can be
used to permit, generate alarms for, or block the requests. After URL filtering is
enabled:
●
Users' access requests to legitimate websites are permitted.
●
Users' access requests to illegitimate websites are blocked.
Configuration Method
Configure URL filtering to enable users to access only www.example.com/working
or www.example.org.
<HUAWEI> system-view
[HUAWEI] defence engine enable
[HUAWEI] profile type url-filter name url_wlan
[HUAWEI-profile-url-filter-url_wlan] default action block
[HUAWEI-profile-url-filter-url_wlan] add whitelist url www.example.com/working
[HUAWEI-profile-url-filter-url_wlan] add whitelist host www.example.org
[HUAWEI-profile-url-filter-url_wlan] quit
[HUAWEI] engine configuration commit
[HUAWEI] defence-profile name defence_wlan
[HUAWEI-defence-profile-defence_wlan] profile type url-filter url_wlan
[HUAWEI-defence-profile-defence_wlan] quit
[HUAWEI] wlan
[HUAWEI-wlan-view] vap-profile name wlan-vap
[HUAWEI-wlan-vap-prof-wlan-vap] defence-profile defence_wlan
3.2.3 Intrusion Prevention
Security Policy
Intrusion prevention is a security mechanism that detects intrusions (including
buffer overflow attacks, Trojan horses, and worms) by analyzing network traffic,
Issue 07 (2021-08-30)
Copyright © Huawei Technologies Co., Ltd.
30
WLAN
Security Hardening Guide
3 (Optional) Level-2 Security Hardening Policies
and terminates intrusion behavior in real time using certain response methods,
protecting enterprise information systems and network architectures from being
attacked. Intrusion prevention has the following advantages:
●
Real-time attack block: A WLAN device is deployed on a network in in-line
mode. When detecting intrusion, the device blocks intrusion and network
attack traffic in real time, minimizing impacts of network intrusions.
●
In-depth protection: New attacks are hidden at the application layer of the
TCP/IP protocol. Intrusion prevention can detect the content of applicationlayer packets, reassemble network data flows for protocol analysis and
detection, and determine the traffic that must be blocked based on the attack
type and policy.
●
All-round protection: Intrusion prevention provides protection measures
against attacks such as worms, viruses, Trojan horses, botnets, spyware,
adware, Common Gateway Interface (CGI) attacks, cross-site scripting attacks,
injection attacks, directory traversal attacks, information leakage, remote file
inclusion attacks, overflow attacks, code execution, DoS attacks, and scanning
tools. All-round protection comprehensively helps defend against various
attacks and protect network security.
●
Internal and external protection: Intrusion prevention can protect enterprises
from both external and internal attacks. The intrusion prevention system (IPS)
can detect the traffic passing through and protect servers and clients.
●
Continuous upgrade and precise protection: The IPS signature database is
updated continuously to maintain the highest security level. You can
periodically upgrade the IPS signature database of a device from the upgrade
center to ensure effective intrusion prevention.
Configuration Method
Configure the intrusion prevention function.
<HUAWEI> system-view
[HUAWEI] defence engine enable
[HUAWEI] profile type ips name profile_ips_pc
[HUAWEI-profile-ips-profile_ips_pc] collect-attack-evidence enable
[HUAWEI-profile-ips-profile_ips_pc] signature-set name filter1
[HUAWEI-profile-ips-profile_ips_pc-sigset-filter1] target both
[HUAWEI-profile-ips-profile_ips_pc-sigset-filter1] severity high
[HUAWEI-profile-ips-profile_ips_pc-sigset-filter1] protocol all
[HUAWEI-profile-ips-profile_ips_pc-sigset-filter1] category all
[HUAWEI-profile-ips-profile_ips_pc-sigset-filter1] application all
[HUAWEI-profile-ips-profile_ips_pc-sigset-filter1] quit
[HUAWEI-profile-ips-profile_ips_pc] quit
[HUAWEI] engine configuration commit
[HUAWEI] defence-profile name defence_wlan
[HUAWEI-defence-profile-defence_wlan] profile type ips profile_ips_pc
[HUAWEI-defence-profile-defence_wlan] quit
[HUAWEI] wlan
[HUAWEI-wlan-view] vap-profile name wlan-vap
[HUAWEI-wlan-vap-prof-wlan-vap] defence-profile defence_wlan
[HUAWEI-wlan-vap-prof-wlan-vap] quit
3.2.4 Antivirus
Attack Behavior
Viruses are a type of malicious codes. Typically, viruses can infect or attach to
application programs or files and are spread through mail or file sharing protocols,
Issue 07 (2021-08-30)
Copyright © Huawei Technologies Co., Ltd.
31
WLAN
Security Hardening Guide
3 (Optional) Level-2 Security Hardening Policies
threatening security of hosts and networks. Viruses perform various types of
harmful activities on infected hosts, such as exhausting host resources, occupying
network bandwidth, controlling host permissions, stealing data, and even
corrupting host hardware.
Security Policy
Antivirus is a security mechanism that can identify and process virus files to
ensure network security and avoid data corruption, permission change, and
system crash caused by virus files.
ACs use the advanced Intelligent Awareness Engine (IAE) and constantly updated
virus signature database to detect and remove viruses. Figure 3-1 shows the
antivirus mechanism.
Figure 3-1 Antivirus mechanism
Configuration Method
Configure the antivirus function.
●
When users attempt to download virus-infected files using HTTP, the
download connection is interrupted.
●
When users download important software in which virus 16424404 is
detected, the download connection will not be interrupted.
<HUAWEI> system-view
[HUAWEI] defence engine enable
[HUAWEI] defence-profile name defence_wlan
[HUAWEI-defence-profile-defence_wlan] quit
[HUAWEI] profile type av name av_http
[HUAWEI-profile-av-av_http] http-detect direction both action block
[HUAWEI-profile-av-av_http] exception av-signature-id 16424404
[HUAWEI-profile-av-av_http] undo ftp-detect
[HUAWEI-profile-av-av_http] undo smtp-detect
[HUAWEI-profile-av-av_http] undo pop3-detect
[HUAWEI-profile-av-av_http] undo imap-detect
Issue 07 (2021-08-30)
Copyright © Huawei Technologies Co., Ltd.
32
WLAN
Security Hardening Guide
3 (Optional) Level-2 Security Hardening Policies
[HUAWEI-profile-av-av_http] undo nfs-detect
[HUAWEI-profile-av-av_http] undo smb-detect
[HUAWEI-profile-av-av_http] quit
[HUAWEI] defence-profile name defence_wlan
[HUAWEI-defence-profile-defence_wlan] profile type av av_http
[HUAWEI-defence-profile-defence_wlan] quit
[HUAWEI] wlan
[HUAWEI-wlan-view] vap-profile name wlan-vap
[HUAWEI-wlan-vap-prof-wlan-vap] defence-profile defence_wlan
3.2.5 ARP Security
3.2.5.1 Defense Against ARP Spoofing Attacks
Attack Behavior
An ARP spoofing attack is initiated when an attacker sends forged ARP packets to
modify ARP entries on valid gateways or hosts. As a result, valid ARP packets
cannot be transmitted properly. The attacker can damage a network in the
following aspects by initiating ARP spoofing attacks:
●
A gateway learns incorrect ARP entries based on the received forged ARP
packets.
●
Users learn incorrect ARP entries based on the received forged ARP packets.
●
A WLAN device learns incorrect ARP entries based on the received malformed
ARP packets.
Security Policy
To defend against the preceding attacks, configure the following security policies
on a WLAN device:
●
Fixed ARP
WLAN devices support three fixed ARP modes: fixed-mac, fixed-all, and
send-ack. These three modes are applicable to different scenarios and are
mutually exclusive.
●
–
The fixed-mac mode applies to networks where user MAC addresses do
not change but user access locations often change. When a user connects
to a different interface on the WLAN device, the device updates interface
information in the ARP entry of the user in a timely manner.
–
The fixed-all mode applies to networks where both user MAC addresses
and user access locations do not change.
–
The send-ack mode applies to networks where both user MAC addresses
and user access locations often change.
Dynamic ARP inspection (DAI)
When a DAI-capable WLAN device receives an ARP packet, it matches the
source IP address, source MAC address, VLAN ID, and interface number of the
ARP packet against binding entries. If a match is found, the device considers
the ARP packet valid and allows it to pass through. Otherwise, the device
discards the packet. Binding entries are dynamically generated through DHCP
snooping or manually configured.
Issue 07 (2021-08-30)
Copyright © Huawei Technologies Co., Ltd.
33
WLAN
Security Hardening Guide
●
3 (Optional) Level-2 Security Hardening Policies
ARP gateway anti-collision
To defend against attacks from bogus gateways, enable ARP gateway anticollision on the WLAN device functioning as a gateway if user hosts directly
connect to the gateway. A WLAN device considers that an ARP gateway
collision occurs if it receives an ARP packet meeting either of the following
conditions:
–
The source IP address of the ARP packet is the same as the IP address of
the VLANIF interface matching the inbound interface of the packet.
–
The source IP address of the ARP packet is the virtual IP address of the
inbound interface, but the source MAC address is not the VRRP virtual
MAC address.
The WLAN device generates an ARP anti-collision entry and discards the
received packets with the same source MAC address and VLAN ID as
those of the ARP packet within a specified period of time. This function
prevents ARP packets with a bogus gateway address from being
broadcast in a VLAN.
●
Gratuitous ARP packet sending
You can enable gratuitous ARP packet sending on the WLAN device that
functions as a gateway. The device then periodically sends gratuitous ARP
packets to update the ARP entries of authorized users so that the ARP entries
contain the correct MAC address of the gateway.
●
MAC address consistency check in an ARP packet
After receiving an ARP packet, the WLAN device checks whether the source
and destination MAC addresses in the Ethernet frame header match those in
the ARP packet. If the source and destination MAC addresses in an ARP
packet are different from those in the Ethernet frame header, the device
regards the packet as an attack and discards it. If the source and destination
MAC addresses in an ARP packet are the same as those in the Ethernet frame
header, the device performs ARP learning. MAC address consistency check in
an ARP packet effectively protects the network or WLAN devices from
malformed ARP packet attacks.
●
ARP packet validity check
To avoid ARP attacks, you can enable ARP packet validity check on a WLAN
device that functions as an access device or gateway to filter out ARP packets
with invalid IP or MAC addresses. The WLAN device checks validity of an ARP
packet based on each or any combination of the following items:
Issue 07 (2021-08-30)
–
Source and destination IP addresses: The WLAN device checks the source
and destination IP addresses in an ARP packet. If the source or
destination IP address is all 0s, all 1s, or a multicast IP address, the device
considers the packet invalid and discards it. The device checks both the
source and destination IP addresses in an ARP Reply packet but checks
only the source IP address in an ARP Request packet.
–
Source MAC address: The WLAN device compares the source MAC
address in an ARP packet with that in the Ethernet frame header. If they
are the same, the packet is valid. If they are different, the device discards
the packet.
–
Destination MAC address: The WLAN device compares the destination
MAC address in an ARP packet with that in the Ethernet frame header. If
they are the same, the packet is valid. If they are different, the device
discards the packet.
Copyright © Huawei Technologies Co., Ltd.
34
WLAN
Security Hardening Guide
●
3 (Optional) Level-2 Security Hardening Policies
Strict ARP learning
After the strict ARP learning function is enabled, the WLAN device learns ARP
entries only for ARP Reply packets in response to ARP Request packets sent by
itself. In this way, the device can defend against most ARP attacks.
Configuration Method
●
Configure fixed ARP.
Enable fixed ARP in fixed-mac mode.
<HUAWEI> system-view
[HUAWEI] arp anti-attack entry-check fixed-mac enable
●
Configure DAI.
Enable DAI on GE0/0/1.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] arp anti-attack check user-bind enable
●
Configure ARP gateway anti-collision.
Enable ARP gateway anti-collision.
<HUAWEI> system-view
[HUAWEI] arp anti-attack gateway-duplicate enable
●
Configure gratuitous ARP packet sending.
Enable gratuitous ARP packet sending on VLANIF 10.
<HUAWEI> system-view
[HUAWEI] interface vlanif 10
[HUAWEI-Vlanif10] arp gratuitous-arp send enable //Configure this command globally or on the
VLANIF interface as required.
●
Configure MAC address consistency check in an ARP packet.
Enable MAC address consistency check in an ARP packet on the specified
interface.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] arp validate source-mac destination-mac
●
Configure ARP packet validity check.
Enable ARP packet validity check and configure the WLAN device to check the
source MAC address in an ARP packet.
<HUAWEI> system-view
[HUAWEI] arp anti-attack packet-check sender-mac
●
Configure strict ARP learning.
Enable strict ARP learning on VLANIF 100.
<HUAWEI> system-view
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] arp learning strict force-enable //Configure this command globally or on the
VLANIF interface as required.
3.2.5.2 Defense Against ARP Flood Attacks
Attack Behavior
If a large number of ARP packets are broadcast on the network, the gateway
cannot process other services due to CPU overload. Processing too many ARP
packets will occupy considerable bandwidth, leading to network congestion and
affecting network communication.
Issue 07 (2021-08-30)
Copyright © Huawei Technologies Co., Ltd.
35
WLAN
Security Hardening Guide
3 (Optional) Level-2 Security Hardening Policies
Security Policy
To defend against the preceding attacks, configure the following security policies
on a WLAN device:
●
ARP entry limit
The device limits the number of ARP entries that an interface can learn to
prevent ARP entry overflow and improve ARP entry security.
●
ARP rate limit
The device counts the number of received ARP packets within a specified
period. If the number of received ARP packets exceeds the upper limit, the
device does not process the excess ARP packets. This function prevents ARP
entry overflow.
●
Strict ARP learning
The WLAN device learns the MAC addresses only of the ARP Reply packets in
response to the ARP Request packets sent by itself. This prevents attacks
initiated by sending ARP Request packets and ARP Reply packets in response
to the request packets that the device itself has sent.
●
ARP port-level protection
The device monitors the ARP packet rate based on ports. When the rate of
ARP packets sent from one port to the control plane exceeds the specified
threshold, the device sends these ARP packets to the control plane through an
independent channel. This function avoids impact of the attack on valid ARP
packets. Alternatively, the device can block ARP packets on the attacked port
for a certain period of time, instead of sending the packets through an
independent channel.
●
ARP user-level protection
The device monitors the rate of ARP packets sent to the control plane based
on users (MAC or IP addresses). When the rate of ARP packets from a user
exceeds the specified threshold, the device discards this user's ARP packets for
a certain period of time.
Configuration Method
●
Configure ARP entry limit.
Configure the maximum number of ARP entries that a specified interface can
learn.
<HUAWEI> system-view
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] arp-limit maximum 20
●
ARP rate limit
Limit the ARP packet rate to 50 pps based on source IP addresses.
<HUAWEI> system-view
[HUAWEI] arp speed-limit source-ip maximum 50
●
Configure strict ARP learning.
Strict ARP learning can be configured globally or on a specified interface and
takes effect as follows:
–
Issue 07 (2021-08-30)
If strict ARP learning is configured globally and on a specified interface,
only the configuration on the interface takes effect.
Copyright © Huawei Technologies Co., Ltd.
36
WLAN
Security Hardening Guide
–
3 (Optional) Level-2 Security Hardening Policies
If strict ARP entry learning is not configured on an interface, the global
configuration takes effect.
Enable strict ARP learning globally.
<HUAWEI> system-view
[HUAWEI] arp learning strict
Enable strict ARP learning on a specified interface.
<HUAWEI> system-view
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] arp learning strict force-enable
●
Configure ARP port-level protection.
Configure GE0/0/1 to allow a maximum of 50 ARP packets to pass through
per second. When the ARP packet rate exceeds the threshold, the device
discards ARP packets on this interface for 60 seconds.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] arp anti-attack rate-limit enable
[HUAWEI-GigabitEthernet0/0/1] arp anti-attack rate-limit 50 60
●
Configure ARP user-level protection.
Configure ARP user-level protection based on users' MAC or IP addresses.
<HUAWEI> system-view
[HUAWEI] cpu-defend policy antiatk
[HUAWEI-cpu-defend-policy-antiatk] auto-defend enable
[HUAWEI-cpu-defend-policy-antiatk] auto-defend threshold 30
[HUAWEI-cpu-defend-policy-antiatk] undo auto-defend trace-type source-portvlan
[HUAWEI-cpu-defend-policy-antiatk] undo auto-defend protocol tcp telnet ttl-expired igmp icmp
dhcpv6 nd
[HUAWEI-cpu-defend-policy-antiatk] auto-defend action deny timer 300
[HUAWEI-cpu-defend-policy-antiatk] quit
[HUAWEI] cpu-defend-policy antiatk
3.2.6 DHCP Security
3.2.6.1 Defense Against Bogus DHCP Server Attacks
Attack Behavior
Due to lack of an authentication mechanism between DHCP servers and DHCP
clients, once a DHCP server is newly configured on a network, it can allocate IP
addresses and other network parameters to DHCP clients even if it is a bogus one.
A bogus DHCP server is connected to the aggregation WLAN device through a
Layer 2 network. When a client connected to the WLAN device applies for an IP
address through DHCP, and the bogus DHCP server responds before other servers
and assigns an IP address to the client, an IP address conflict will occur on the
network, affecting network services.
Security Policy
To defend against the preceding attacks, enable DHCP snooping on the WLAN
device and configure the interface connected to the valid DHCP server as a trusted
interface to filter out rogue DHCP servers.
Configuration Method
Configure packet validity check based on DHCP snooping.
Issue 07 (2021-08-30)
Copyright © Huawei Technologies Co., Ltd.
37
WLAN
Security Hardening Guide
1.
3 (Optional) Level-2 Security Hardening Policies
Configure the interface connected to the valid DHCP server as a trusted
interface.
<HUAWEI> system-view
[HUAWEI] dhcp enable
[HUAWEI] dhcp snooping enable
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] dhcp snooping enable
[HUAWEI-GigabitEthernet0/0/1] dhcp snooping trusted
[HUAWEI-GigabitEthernet0/0/1] quit
2.
Enable DHCP snooping on another user-side interface or in a VLAN.
[HUAWEI] interface gigabitethernet 0/0/2
[HUAWEI-GigabitEthernet0/0/2] dhcp snooping enable
3.2.6.2 Defense Against DHCP Flood Attacks
Attack Behavior
When a WLAN device functioning as a DHCP server or relay agent receives a large
number of DHCP packets sent by a malicious user, the WLAN device cannot
process valid DHCP packets because it is focusing its DHCP processing capability
on such malicious packets. As a result, clients cannot obtain or renew IP addresses.
Security Policy
To defend against the preceding attacks, configure the following security policies
on a WLAN device:
●
DHCP port-level protection
The WLAN device monitors DHCP packet rate based on ports. When the rate
of DHCP packets sent to the control plane from one port exceeds the specified
threshold, the device sends these DHCP packets to the control plane through
an independent channel. This function avoids impact of the attack on valid
DHCP packets.
●
DHCP user-level protection
The WLAN device monitors the rate of DHCP packets sent to the control
plane based on users (MAC or IP addresses). When the rate of DHCP packets
from a user exceeds the specified threshold, the device discards this user's
DHCP packets for a certain period of time.
Configuration Method
●
Configure DHCP port-level protection.
Set the maximum rate of DHCP packets sent from GE0/0/1 to the DHCP
packet processing unit to 30. The WLAN device then discards packets
exceeding the rate.
<HUAWEI> system-view
[HUAWEI] dhcp enable
[HUAWEI] dhcp snooping enable
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] dhcp snooping enable
[HUAWEI-GigabitEthernet0/0/1] dhcp snooping check dhcp-rate enable
[HUAWEI-GigabitEthernet0/0/1] dhcp snooping check dhcp-rate 30
[HUAWEI-GigabitEthernet0/0/1] quit
●
Issue 07 (2021-08-30)
Configure DHCP user-level protection based on users' MAC or IP addresses.
<HUAWEI> system-view
[HUAWEI] cpu-defend policy antiatk
Copyright © Huawei Technologies Co., Ltd.
38
WLAN
Security Hardening Guide
3 (Optional) Level-2 Security Hardening Policies
[HUAWEI-cpu-defend-policy-antiatk] auto-defend enable
[HUAWEI-cpu-defend-policy-antiatk] auto-defend threshold 30
[HUAWEI-cpu-defend-policy-antiatk] undo auto-defend trace-type source-portvlan
[HUAWEI-cpu-defend-policy-antiatk] undo auto-defend protocol tcp telnet ttl-expired igmp icmp
dhcpv6 mld nd
[HUAWEI-cpu-defend-policy-antiatk] auto-defend action deny timer 300
[HUAWEI-cpu-defend-policy-antiatk] quit
[HUAWEI] cpu-defend-policy antiatk
3.2.7 Routing Protocol Security
3.2.7.1 BGP/BGP4+
Attack Behavior
●
DoS attacks
An attacker can send various types of packets to attack a WLAN device. If the
packets are multicast protocol packets or are destined for an interface
(including the loopback interface) on the WLAN device, the device directly
sends these packets to the CPU. This is a waste of CPU and system resources,
leading to DoS attacks.
●
Construction of error BGP packets
An attacker constructs error packets with an extra-long AS_path attribute to
attack a WLAN device.
●
Quintuple attacks of data packets
BGP uses TCP as the transmission protocol, and BGP considers a data packet
valid as long as the source address, destination address, source port,
destination port, and TCP sequence number of the packet are correct.
However, most parameters in a data packet can be easily obtained by
attackers.
●
GTSM attacks
An attacker simulates BGP and continuously sends attack packets to a WLAN
device. As a result, the WLAN device is extremely busy in processing such
attack packets, rocketing CPU usage.
Security Policy
To defend against the preceding attacks, configure the following security policies
on a WLAN device:
●
CPCAR
After a BGP session is created, the system delivers a whitelist. The applicationlayer association module checks the received protocol packets and sends
protocol packets that match the whitelist at a large bandwidth and high rate.
The module sends protocol packets that do not match the whitelist at the
default bandwidth and rate to prevent DoS attacks. In addition, CPCAR is used
on interfaces to limit the transmission rate of BGP packets, protect the CPU
against attacks, and ensure normal running of the network.
●
Limitation on the number of AS numbers in the AS-path attribute
When a BGP-capable WLAN device receives a route, the device checks
whether the number of AS numbers in the AS-path attribute exceeds the
Issue 07 (2021-08-30)
Copyright © Huawei Technologies Co., Ltd.
39
WLAN
Security Hardening Guide
3 (Optional) Level-2 Security Hardening Policies
threshold. If so, the WLAN device discards the route. During route
advertisement, the WLAN device also checks whether the number of AS
numbers in the AS-path attribute exceeds the threshold. If so, the WLAN
device does not advertise the route to prevent maliciously-constructed error
packets with an extra-long AS-path attribute from attacking the WLAN
device.
●
BGP MD5 authentication and BGP keychain authentication
To protect BGP from attacks, use MD5 authentication or keychain
authentication between BGP peers to reduce the possibility of attacks.
●
–
The MD5 algorithm is easy to configure and generates a single password
that needs to be manually changed. To ensure high security, you are not
advised to use MD5 authentication.
–
The keychain algorithm is complex to configure and generates a set of
passwords. Keychain authentication allows passwords to be changed
automatically based on configurations. Therefore, keychain
authentication is applicable to networks requiring high security.
BGP GTSM
To protect a WLAN device against the attacks initiated using forged BGP
packets, you can configure GTSM to check whether the TTL value in the IP
packet header is within the specified range. In actual networking, packets
whose TTL values are not within the specified range are either allowed to
pass or discarded by the GTSM. When the default action to be taken on
packets is set to drop in GTSM, set a proper TTL range according to the
network topology. Then packets with TTL values outside of the specified range
are discarded, preventing attackers from simulating BGP packets to attack the
WLAN device.
Configuration Method
●
Modify the CPCAR value of BGP.
NOTE
Improper CPCAR settings will affect services on your network. To adjust the CPCAR
values, contact technical support personnel.
Change the rate at which BGP packets are sent to the CPU to 64 kbit/s.
<HUAWEI> system-view
[HUAWEI] cpu-defend policy 1
[HUAWEI-cpu-defend-policy-1] packet-type bgp rate-limit 64 wired
[HUAWEI-cpu-defend-policy-1] quit
[HUAWEI] cpu-defend-policy 1
●
Set the maximum number of AS numbers in the AS-path attribute.
Set the maximum number of AS numbers in the AS-path attribute to 200.
<HUAWEI> system-view
[HUAWEI] bgp 100
[HUAWEI-bgp] as-path-limit 200
●
Configure keychain authentication.
Configure the keychain authentication named huawei for BGP peers.
<HUAWEI> system-view
[HUAWEI] keychain huawei mode absolute
[HUAWEI-keychain-huawei] key-id 1
[HUAWEI-keychain-huawei-keyid-1] algorithm sha-256
[HUAWEI-keychain-huawei-keyid-1] key-string cipher Huawei@1234
Issue 07 (2021-08-30)
Copyright © Huawei Technologies Co., Ltd.
40
WLAN
Security Hardening Guide
3 (Optional) Level-2 Security Hardening Policies
[HUAWEI-keychain-huawei-keyid-1] quit
[HUAWEI-keychain-huawei] quit
[HUAWEI] bgp 100
[HUAWEI-bgp] peer 10.1.1.2 as-number 200
[HUAWEI-bgp] peer 10.1.1.2 keychain huawei
●
Configure BGP GTSM.
Configure GTSM for the peer.
<HUAWEI> system-view
[HUAWEI] bgp 100
[HUAWEI-bgp] peer 10.1.1.2 as-number 200
[HUAWEI-bgp] peer 10.1.1.2 valid-ttl-hops 1
For packets that do not match the GTSM policy, you can specify pass in the
gtsm default-action { drop | pass } command or run the undo gtsm
default-action drop command to allow these packets to pass through, or
specify drop in the command to discard them. You can also enable the
logging function using the gtsm log drop-packet all command to record
information about dropped packets for further fault locating.
3.2.7.2 OSPF/OSPFv3
Attack Behavior
●
GTSM attacks
An attacker simulates OSPF/OSPFv3 and continuously sends packets to a
WLAN device. As a result, the WLAN device is extremely busy in processing
such attack packets, rocketing CPU usage.
●
Forged packet attacks
An attacker may attack a WLAN device using forced packets as follows:
–
Changes the aging time of a packet to the maximum aging time so that
all WLAN devices discard the packet.
–
Advertises the LSAs with valid Max Sequence Numbers or with sequence
numbers close to the Max Sequence Number.
–
Changes the sequence number when a peer WLAN device resets the state
of the encryption sequence number during a restart.
–
Changes the peer list in Hello packets.
Security Policy
To defend against the preceding attacks, configure the following security policies
on a WLAN device:
●
OSPF/OSPFv3 GTSM
The Generalized TTL Security Mechanism (GTSM) checks TTL values to defend
against GTSM attacks. GTSM only checks TTL values of the packets that
match the GTSM policy. The packets that do not match the GTSM policy can
be dropped or allowed to pass through. If the default action to be taken on
packets is drop, configure all possible device connections in the GTSM policy.
Packets sent from a device that is not specified in the GTSM policy will be
dropped. As a result, the connection cannot be established.
●
OSPF/OSPFv3 packet authentication
OSPF/OSPFv3 packet authentication prevents forged packet attacks. A WLAN
device can set up neighbor relationships only with authenticated devices. If
Issue 07 (2021-08-30)
Copyright © Huawei Technologies Co., Ltd.
41
WLAN
Security Hardening Guide
3 (Optional) Level-2 Security Hardening Policies
area authentication is used, configure the same authentication mode and
password for all WLAN devices in an area. For example, the authentication
mode of all WLAN devices in Area 0 is simple authentication and the
password is abc. Interface authentication is used to set the authentication
mode and password used between neighboring WLAN devices. It takes
precedence over area authentication.
Configuration Method
To configure OSPF GTSM, OSPF area authentication, and OSPF interface
authentication, perform the following steps:
●
Configure OSPF GTSM.
Enable OSPF GTSM and set the maximum number of TTL hops to 5 for OSPF
packets that can be received from a public network.
<HUAWEI> system-view
[HUAWEI] ospf valid-ttl-hops 5
For packets that do not match the GTSM policy, you can specify pass in the
gtsm default-action { drop | pass } command or run the undo gtsm
default-action drop command to allow these packets to pass through, or
specify drop in the command to discard them. You can also enable the
logging function using the gtsm log drop-packet all command to record
information about dropped packets for further fault locating.
●
Configure OSPF area authentication.
Configure HMAC-SHA256 authentication for OSPF area 0.
<HUAWEI> system-view
[HUAWEI] ospf 100
[HUAWEI-ospf-100] area 0
[HUAWEI-ospf-100-area-0.0.0.0] authentication-mode hmac-sha256
●
Configure OSPF interface authentication.
Configure OSPF HMAC-SHA256 authentication on VLANIF 100.
<HUAWEI> system-view
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] ospf authentication-mode hmac-sha256
To configure OSPFv3 GTSM, OSPFv3 area authentication, OSPFv3 process
authentication, and OSPFv3 interface authentication, perform the following steps:
●
Configure OSPFv3 GTSM.
Enable OSPFv3 GTSM and set the maximum number of TTL hops to 5 for the
OSPFv3 packets that can be received from a public network.
<HUAWEI> system-view
[HUAWEI] ospfv3 valid-ttl-hops 5
For packets that do not match the GTSM policy, you can specify pass in the
gtsm default-action { drop | pass } command or run the undo gtsm
default-action drop command to allow these packets to pass through, or
specify drop in the command to discard them. You can also enable the
logging function using the gtsm log drop-packet all command to record
information about dropped packets for further fault locating.
●
Configure OSPFv3 area authentication.
Configure HMAC-SHA256 authentication for OSPFv3 area 0.
<HUAWEI> system-view
[HUAWEI] ospfv3 100
Issue 07 (2021-08-30)
Copyright © Huawei Technologies Co., Ltd.
42
WLAN
Security Hardening Guide
3 (Optional) Level-2 Security Hardening Policies
[HUAWEI-ospfv3-100] area 0
[HUAWEI-ospfv3-100-area-0.0.0.0] authentication-mode hmac-sha256 key-id 10 cipher huawei
●
Configure OSPFv3 process authentication.
Configure HMAC-SHA256 authentication for OSPFv3 process 100.
<HUAWEI> system-view
[HUAWEI] ospfv3 100
[HUAWEI-ospfv3-100] authentication-mode hmac-sha256 key-id 10 cipher huawei
●
Configure OSPFv3 interface authentication.
Configure OSPFv3 HMAC-SHA256 authentication on VLANIF 100.
<HUAWEI> system-view
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] ipv6 enable
[HUAWEI-Vlanif100] ospfv3 1 area 0
[HUAWEI-Vlanif100] ospfv3 authentication-mode hmac-sha256 key-id 10 cipher huawei
3.2.7.3 RIP/RIPng
Attack Behavior
●
Injection of incorrect routing information
RIP/RIPng will accept any packet from a valid packet source address that
matches the configured network. RIP will carry direct route data in its RIP/
RIPng packet. As a result, an attack with invalid or incorrect route information
in route data of the RIP/RIPng packet may be initiated. With this information,
the calculated routing database will not be correct and can cause network
failures.
●
Replay attack
An attacker intercepts RIP packets and sends them to the WLAN device
repeatedly, increasing the load on the WLAN device.
Security Policy
To defend against the preceding attacks, configure the following security policies
on a WLAN device:
●
RIP authentication
RIPv2 can be used to authenticate protocol packets to prevent incorrect
routing data, error packets, and replay attacks. Three authentication modes
are available: simple authentication, MD5 authentication, and HMAC-SHA256
authentication. Simple authentication and MD5 authentication pose potential
risks. Therefore, HMAC-SHA256 ciphertext authentication is recommended.
●
CPCAR
The CPCAR limits the rate of RIP/RIPng packets sent to the control plane to
ensure security of the control plane.
Configuration Method
●
Configure RIP authentication.
Configure HMAC-SHA256 authentication, set the authentication password to
admin@1234, and set the authentication identifier to 255.
Issue 07 (2021-08-30)
Copyright © Huawei Technologies Co., Ltd.
43
WLAN
Security Hardening Guide
3 (Optional) Level-2 Security Hardening Policies
<HUAWEI> system-view
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] rip authentication-mode hmac-sha256 cipher admin@1234 255
●
Modify the CPCAR value of RIP/RIPng.
NOTE
Improper CPCAR settings will affect services on your network. To adjust the CPCAR values,
contact technical support personnel.
Change the rate at which RIP packets are sent to the CPU to 64 kbit/s.
<HUAWEI> system-view
[HUAWEI] cpu-defend policy 1
[HUAWEI-cpu-defend-policy-1] packet-type rip rate-limit 64 wired
[HUAWEI-cpu-defend-policy-1] quit
[HUAWEI] cpu-defend-policy 1
Change the rate at which RIPng packets are sent to the CPU to 64 kbit/s.
<HUAWEI> system-view
[HUAWEI] cpu-defend policy 1
[HUAWEI-cpu-defend-policy-1] packet-type ripng rate-limit 64 wired
[HUAWEI-cpu-defend-policy-1] quit
[HUAWEI] cpu-defend-policy 1
3.2.7.4 IS-IS (IPv4)/IS-IS (IPv6)
Attack Behavior
An attacker can obtain correct Hello packets or link state packets from the
network, forge attack packets that can be identified by IS-IS, and send these
packets to a WLAN device.
Security Policy
IS-IS authentication is an encryption method based on network security
requirements and can prevent the preceding attacks.
In IS-IS authentication, authentication fields are added in IS-IS packets for
encryption. When a local WLAN device receives an IS-IS packet from a remote
WLAN device, the local device discards the packet if the authentication password
is different from the local one. This process protects the local device against
potential attacks. IS-IS authentication includes the following types:
●
Interface authentication: encapsulates authentication information into Hello
packets to confirm the validity and correctness of neighbor relationships.
●
Area or routing domain authentication: encapsulates the authentication
password into IS-IS packets in the area. Only authenticated packets are
received.
The authentication modes are classified into simple authentication, MD5
authentication, and HMAC-SHA256 authentication. Simple authentication and
MD5 authentication pose potential security risks. Therefore, HMAC-SHA256
authentication is recommended.
Issue 07 (2021-08-30)
Copyright © Huawei Technologies Co., Ltd.
44
WLAN
Security Hardening Guide
3 (Optional) Level-2 Security Hardening Policies
Configuration Method
●
Configure interface authentication.
Set the HMAC-SHA256 authentication password to admin@1234 and key ID
to 33 on VLANIF 100.
<HUAWEI> system-view
[HUAWEI] isis
[HUAWEI-isis-1] network-entity 01.0000.0000.0001.00
[HUAWEI-isis-1] quit
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] isis enable 1
[HUAWEI-Vlanif100] isis authentication-mode hmac-sha256 key-id 33 cipher admin@1234
●
Configure area or routing domain authentication.
a.
b.
Create IS-IS process 1.
<HUAWEI> system-view
[HUAWEI] isis 1
Perform the following operations in any sequence as required.
▪
Set the area authentication mode to HMAC-SHA256, authentication
password to admin@1234, and key ID to 33.
[HUAWEI-isis-1] area-authentication-mode hmac-sha256 key-id 33 cipher
admin@1234
▪
Set the routing domain authentication mode to HMAC-SHA256,
authentication password to admin@1234, and key ID to 33.
[HUAWEI-isis-1] domain-authentication-mode hmac-sha256 key-id 33 cipher
admin@1234
3.2.8 Multicast Security
3.2.8.1 Layer 2 Multicast
Attack Behavior
●
Malicious users access a WLAN device using changed multicast addresses over
invalid multicast channels. As a result, many invalid entries are generated on
the device and occupy a large number of system resources, and program
requests of authorized users cannot succeed.
●
Attacks are initiated through query packets. A multicast port is configured on
the WLAN device to receive traffic from all multicast groups. As a result, a
large amount of traffic is sent over this port, occupying large interface
bandwidth.
Security Policy
To defend against the preceding attacks, configure the following security policies
on a WLAN device:
●
You can set group policies to restrict the access of multicast groups (multicast
source groups) to a VLAN or an interface to prevent malicious users from
accessing the WLAN device using invalid multicast channels.
●
You can configure WLAN device ports not to be learned through protocol
packets to prevent query packet attacks.
Issue 07 (2021-08-30)
Copyright © Huawei Technologies Co., Ltd.
45
WLAN
Security Hardening Guide
3 (Optional) Level-2 Security Hardening Policies
Configuration Method
●
Configure a multicast group policy.
You can configure a multicast group policy in the VLAN view or VSI view.
(Multicast group policies based on the IPTV multicast group address range are
recommended according to service deployment requirements.)
Allow hosts in VLAN 2 to join the multicast group 225.1.1.123.
<HUAWEI> system-view
[HUAWEI] acl number 2000
[HUAWEI-acl-basic-2000] rule permit source 225.0.0.0 0.0.0.255
[HUAWEI-acl-basic-2000] quit
[HUAWEI] igmp-snooping enable
[HUAWEI] vlan 2
[HUAWEI-vlan2] igmp-snooping enable
[HUAWEI-vlan2] igmp-snooping group-policy 2000
●
Configure ports not to be learned.
You can configure WLAN device ports not to be learned through protocol
packets in the VLAN view or interface view.
Disable dynamic WLAN device port learning on GE0/0/1 in VLAN 10.
<HUAWEI> system-view
[HUAWEI] igmp-snooping enable
[HUAWEI] vlan 10
[HUAWEI-vlan10] igmp-snooping enable
[HUAWEI-vlan10] quit
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] undo igmp-snooping router-learning vlan 10
3.2.8.2 Layer 3 Multicast
Security Policy
WLAN devices support the following security policies:
●
PIM neighbor filtering
ACL rules can be configured on interfaces to filter received Hello packets.
Neighbor relationships can be established only after packet filtering.
When there are a large number of malicious Hello packets, configure rules on
interfaces so that the interfaces allow only specified Hello packets to pass
through and discard malicious Hello packets.
●
PIM Join packet filtering
ACL rules can be configured on interfaces to filter received Join packets. This
can prevent attacks initiated using malicious Join packets.
When there are a large number of malicious Join packets, configure rules on
interfaces so that the interfaces allow only specified Join packets to pass
through and discard malicious Join packets.
Configuration Method
●
Configure PIM neighbor filtering.
In a public network instance, set up a PIM neighbor relationship between
VLANIF 10 and the WLAN device at 10.4.4.4.
<HUAWEI> system-view
[HUAWEI] acl number 2001
[HUAWEI-acl-basic-2001] rule permit source 10.4.4.4 0.0.0.0
Issue 07 (2021-08-30)
Copyright © Huawei Technologies Co., Ltd.
46
WLAN
Security Hardening Guide
3 (Optional) Level-2 Security Hardening Policies
[HUAWEI-acl-basic-2001] quit
[HUAWEI] interface vlanif 10
[HUAWEI-Vlanif10] pim neighbor-policy 2001
●
PIM Join packet filtering
In a public network instance, configure VLANIF 10 to receive Join packets with
multicast addresses on the network segment 225.1.0.0/16.
<HUAWEI> system-view
[HUAWEI] acl number 2001
[HUAWEI-acl-basic-2001] rule permit source 225.1.0.0 0.0.255.255
[HUAWEI-acl-basic-2001] quit
[HUAWEI] multicast routing-enable
[HUAWEI] interface vlanif 10
[HUAWEI-Vlanif10] pim join-policy asm 2001
3.3 Forwarding Plane
3.3.1 ACL
Security Policy
An Access Control List (ACL) accurately identifies and controls packets on the
network to manage network access behavior, prevent network attacks, and
improve bandwidth use efficiency. In this way, ACL ensures security and high
service quality on networks.
An ACL is a collection of one or more rules. A rule refers to a judgment statement
that describes a packet matching condition, which may be a source address, a
destination address, or a port number of a packet. An ACL classifies packets by
using these rules. When the rules are applied to a WLAN device, the device
determines whether packets are permitted or denied in accordance with these
rules. For example, an ACL can be configured to reject all Telnet access to the local
server or allow each STA to send emails to the local server using Simple Mail
Transfer Protocol (SMTP).
Multiple rules can be defined in each ACL. ACLs are classified into the following
types based on their functions: basic ACL, basic ACL6, advanced ACL, advanced
ACL6, Layer 2 ACL, user ACL, and user ACL6.
Table 3-1 describes ACL classification based on ACL rule definition methods.
Table 3-1 ACL classification based on ACL rule definition methods
ACL
Type
IP Version
Rule Definition Description
ACL Number
Range
Basic
ACL
IPv4
Defines rules based on the
source IP address,
fragmentation information,
and time range of packets.
2000-2999
Issue 07 (2021-08-30)
Copyright © Huawei Technologies Co., Ltd.
47
WLAN
Security Hardening Guide
3 (Optional) Level-2 Security Hardening Policies
ACL
Type
IP Version
Rule Definition Description
ACL Number
Range
Advance
d ACL
IPv4
Defines rules based on the
source IP address, destination
IP address, IP priority, Type of
Service (ToS) value, DiffServ
Code Point (DSCP) value, IP
protocol type, Internet Control
Message Protocol (ICMP) type,
TCP source interface/
destination interface, and User
Datagram Protocol (UDP)
source interface/destination
interface of IPv4 packets.
3000-3999
Layer 2
ACL
IPv4
Defines rules based on the
information in Ethernet frame
headers of packets, such as the
source MAC address,
destination MAC address, and
Ethernet frame protocol type.
4000-4999
User ACL
IPv4
Defines rules based on the
source IP address, source user
group, destination IP addresses,
destination user group,
destination domain name, IP
priority, ToS value, DSCP value,
IP protocol type, ICMP type,
TCP source interface/
destination interface, and UDP
source interface/destination
interface of IPv4 packets.
6000-6999
Basic
ACL6
IPv6
Defines rules based on the
source IPv6 address,
fragmentation information,
and time range of IPv6
packets.
2000-2999
Advance
d ACL6
IPv6
Defines rules based on the
source IP address, destination
IP address, protocol over IP,
and protocol-specific features
such as the TCP source
interface/destination interface,
ICMPv6 protocol type, and
ICMPv6 code of IPv6 packets.
3000-3999
Issue 07 (2021-08-30)
Copyright © Huawei Technologies Co., Ltd.
48
WLAN
Security Hardening Guide
3 (Optional) Level-2 Security Hardening Policies
ACL
Type
IP Version
Rule Definition Description
ACL Number
Range
User
ACL6
IPv6
Defines rules based on the
source IP address, destination
IP address, destination domain
name, protocol over IP, and
protocol-specific features such
as the TCP source interface/
destination interface, ICMPv6
protocol type, and ICMPv6
code of IPv6 packets.
The user IPv6 ACL
is called ACL6 or
UCL6 for short.
The ACL number
ranges from 6000
to 6999.
Configuration Method
Configure ACL 2001 to allow packets with the source IP address 192.168.32.1 to
pass through.
<HUAWEI> system-view
[HUAWEI] acl 2001
[HUAWEI-acl-basic-2001] rule permit source 192.168.32.1 0
3.3.2 MAC Address Anti-flapping
Security Policy
MAC address flapping occurs on a network when the network has a loop or
undergoes certain attacks. You can use the following methods to prevent MAC
address flapping:
●
Increase the MAC address learning priority of an interface.
MAC address flapping occurs when a MAC address is learned by two
interfaces in the same VLAN and the MAC address entry learned later
overrides the earlier one. To prevent MAC address flapping, set different MAC
address learning priorities for interfaces. When two interfaces learn the same
MAC address entries, the MAC address entries learned by the interface with a
higher priority override the MAC address entries learned by the other
interface.
●
Prevent MAC address flapping between interfaces with the same priority.
An uplink interface of a WLAN device is connected to a server, and a downlink
interface is connected to a user. To prevent unauthorized users from using the
server MAC address to connect to the WLAN device, you can run the undo
mac-learning priority allow-flapping command to forbid MAC address
flapping between interfaces with the same priority. A MAC address then will
not be learned by multiple interfaces, and unauthorized users cannot use the
MAC address of a valid device to attack the WLAN device.
Configuration Method
●
Issue 07 (2021-08-30)
Configure a MAC address learning priority for an interface.
Copyright © Huawei Technologies Co., Ltd.
49
WLAN
Security Hardening Guide
3 (Optional) Level-2 Security Hardening Policies
For example, GE0/0/1 is a network-side port and GE0/0/2 is a user-side port.
Set the MAC address learning priority of GE0/0/1 to 3, which is higher than
that of GE0/0/2. GE0/0/2 retains the default priority 0.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] mac-learning priority 3
●
Forbid MAC address flapping between interfaces with the same priority. (By
default, MAC address flapping can occur between interfaces with the same
priority.)
Forbid MAC address flapping between interfaces with priority 1.
<HUAWEI> system-view
[HUAWEI] undo mac-learning priority 1 allow-flapping
3.3.3 Port Isolation
Security Policy
To implement Layer 2 isolation between packets, you can add different ports to
different VLANs. However, this wastes VLAN resources. Port isolation can isolate
ports in the same VLAN. That is, you only need to add ports to a port isolation
group to implement Layer 2 isolation between these ports. Port isolation provides
secure and flexible networking schemes for customers.
To isolate broadcast packets in the same VLAN but allow users connecting to
different ports to communicate at Layer 3, you can set the port isolation mode to
Layer 2 isolation and Layer 3 interworking. To prevent users connecting to ports in
the same VLAN from communicating at either Layer 2 or Layer 3, you can set the
port isolation mode to Layer 2 and Layer 3 isolation.
Configuration Method
Port isolation includes bidirectional and unidirectional isolation. By default, the
port isolation mode is Layer 2 isolation and Layer 3 interworking. To set the port
isolation mode to Layer 2 and Layer 3 isolation, run the port-isolate mode all
command.
●
Configure a port isolation group.
Configure port isolation on GE0/0/1 and GE0/0/2.
Configure port isolation on GE0/0/1.
<HUAWEI> system-view
[HUAWEI] port-isolate mode all
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] port-isolate enable group 3
Configure port isolation on GE0/0/2.
<HUAWEI> system-view
[HUAWEI] port-isolate mode all
[HUAWEI] interface gigabitethernet 0/0/2
[HUAWEI-GigabitEthernet0/0/2] port-isolate enable group 3
●
Configure unidirectional isolation.
Configure unidirectional isolation on GE0/0/1 and GE0/0/2.
<HUAWEI> system-view
[HUAWEI] port-isolate mode all
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] am isolate gigabitethernet 0/0/2
Issue 07 (2021-08-30)
Copyright © Huawei Technologies Co., Ltd.
50
WLAN
Security Hardening Guide
3 (Optional) Level-2 Security Hardening Policies
3.3.4 Port Security and Trusted Port
Security Policy
●
Port security
If a network requires high access security, you can configure port security on
specified ports. MAC addresses learned by these ports then are changed to
secure dynamic MAC addresses, secure static MAC addresses, or sticky MAC
addresses. When the number of learned MAC addresses reaches the upper
limit, the ports do not learn new MAC addresses. In this case, the WLAN
device communicates only with devices with these learned MAC addresses.
This prevents hosts with untrusted MAC addresses from communicating with
the WLAN device through these ports, securing the WLAN device and
network. You can enable port security on the ports of ACs and wired ports of
APs.
●
Trusted port
The wired port of an AP directly or indirectly connected to an authorized
DHCP server needs to be configured as a DHCP-trusted port. The AP then
receives and forwards DHCP Offer/ACK/NAK packets sent only by the
authorized DHCP server to STAs, so that the STAs can obtain valid IP
addresses and go online properly.
Similarly, the wired port of an AP directly or indirectly connected to an
authorized ND server needs to be configured as an ND-trusted port. The AP
then receives and forwards ND Offer/ACK/NAK packets sent only by the
authorized ND server to STAs, so that the STAs can obtain valid IPv6
addresses and go online properly.
Configuration Method
●
Configure port security on the AC.
–
Configure the secure MAC address function on a port of the AC.
Configure GE0/0/1 to allow a maximum of two STAs to access. Therefore,
set the maximum number of secure MAC addresses to 2.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] port-security enable
[HUAWEI-GigabitEthernet0/0/1] port-security max-mac-num 2
[HUAWEI-GigabitEthernet0/0/1] port-security protect-action restrict
[HUAWEI-GigabitEthernet0/0/1] quit
–
Configure the sticky MAC address function on a port of the AC.
Configure the sticky MAC address function on GE0/0/1.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] port-security enable
[HUAWEI-GigabitEthernet0/0/1] port-security mac-address sticky
[HUAWEI-GigabitEthernet0/0/1] port-security max-mac-num 5
[HUAWEI-GigabitEthernet0/0/1] quit
●
Configure AP wired port security.
–
Configure the AP wired port as a trusted port.
NOTE
This function applies only to downstream AP wired ports.
Issue 07 (2021-08-30)
Copyright © Huawei Technologies Co., Ltd.
51
WLAN
Security Hardening Guide
3 (Optional) Level-2 Security Hardening Policies
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] wired-port-profile name wired-port1
[HUAWEI-wlan-wired-port-wired-port1] dhcp trust port
[HUAWEI-wlan-wired-port-wired-port1] nd trust port
[HUAWEI-wlan-wired-port-wired-port1] quit
[HUAWEI-wlan-view] ap-group name group1
[HUAWEI-wlan-ap-group-group1] wired-port-profile wired-port1 gigabitethernet 1
–
Configure port security on the AP wired port.
NOTE
This function takes effect only for the AP wired ports working in endpoint mode.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] wired-port-profile name wired-port1
[HUAWEI-wlan-wired-port-wired-port1] mode endpoint
[HUAWEI-wlan-wired-port-wired-port1] port-security enable
[HUAWEI-wlan-wired-port-wired-port1] port-security mac-address sticky
[HUAWEI-wlan-wired-port-wired-port1] port-security max-mac-num 5
[HUAWEI-wlan-wired-port-wired-port1] quit
[HUAWEI-wlan-view] ap-group name group1
[HUAWEI-wlan-ap-group-group1] wired-port-profile wired-port1 gigabitethernet 0
3.3.5 Navi AC
Security Policy
When a large enterprise deploys a WLAN to provide access services for internal
employees, the enterprise also needs to provide wireless access services for guests.
However, guest data may pose security threats over the network. You can
configure the Navi AC function to direct guest traffic to a specified access control
point for centralized management, so that internal employees and guests are
isolated from each other.
As shown in Figure 3-2, traffic of enterprise employees is forwarded on the
intranet and employees can access intranet servers. Traffic of guests is forwarded
to a secure DMZ through a CAPWAP tunnel. The guests then obtain IP addresses
and are authenticated in a unified manner in the DMZ, and can access only
servers in the DMZ and the Internet.
Issue 07 (2021-08-30)
Copyright © Huawei Technologies Co., Ltd.
52
WLAN
Security Hardening Guide
3 (Optional) Level-2 Security Hardening Policies
Figure 3-2 Typical networking of the Navi AC
Configuration Method
1.
On the Navi AC, create and configure a VAP profile, enable the Navi AC
function, specify the local AC address, and bind the VAP profile to the
specified local AC.
a.
Create and configure a VAP profile on the Navi AC.
b.
Enable the Navi AC function.
c.
2.
[Navi_AC-wlan-view] navi-ac enable
Specify the local AC and bind the VAP profile to the local AC.
[Navi_AC-wlan-view] navi-ac
[Navi_AC-wlan-view-navi-ac] local-ac ac-id 1 ip-address 10.23.102.3 description LocalAC1
[Navi_AC-wlan-view-navi-ac] vap-profile navi-ac wlan 1
On the local AC, specify the Navi AC address, create and configure a VAP
profile, and bind the VAP profile to the AP group. The VAP profile
configuration on the local AC must be the same as that on the Navi AC.
a.
b.
Issue 07 (2021-08-30)
<Navi_AC> system-view
[Navi_AC] wlan
[Navi_AC-wlan-view] ssid-profile name ssid1
[Navi_AC-ssid-prof-ssid1] ssid guset
[Navi_AC-ssid-prof-ssid1] quit
[Navi_AC-wlan-view] vap-profile name navi-ac
[Navi_AC-vap-prof-navi-ac] ssid-profile ssid1
[Navi_AC-vap-prof-navi-ac] service-vlan vlan-id 100
[Navi_AC-vap-prof-navi-ac] forward-mode tunnel
[Navi_AC-vap-prof-navi-ac] quit
Specify the Navi AC.
<Local_AC> system-view
[Local_AC] wlan
[Local_AC-wlan-view] navi-ac ac-id 1 ip-address 10.23.101.3 description NaviAC
Create and configure a VAP profile on the local AC.
Copyright © Huawei Technologies Co., Ltd.
53
WLAN
Security Hardening Guide
3 (Optional) Level-2 Security Hardening Policies
[Local_AC-wlan-view] ssid-profile name ssid1
[Local_AC-ssid-prof-ssid1] ssid guset
[Local_AC-ssid-prof-ssid1] quit
[Local_AC-wlan-view] vap-profile name navi-ac
[Local_AC-vap-prof-navi-ac] ssid-profile ssid1
[Local_AC-vap-prof-navi-ac] service-vlan vlan-id 100
[Local_AC-vap-prof-navi-ac] forward-mode tunnel
[Local_AC-vap-prof-navi-ac] type service-navi navi-ac-id 1 navi-wlan-id 1
[Local_AC-vap-prof-navi-ac] quit
c.
Bind the VAP profile to the AP group.
[Local_AC-wlan-view] ap-group name group1
[Local_AC-wlan-ap-group-group1] vap-profile navi-ac wlan 2 radio all
3.3.6 CAPWAP Data Tunnel Encryption
Security Policy
When the data forwarding mode is tunnel forwarding, service data packets
between an AP and an AC are transmitted over a CAPWAP data tunnel. To
improve service data security, you can run the capwap dtls data-link encrypt
enable command to enable CAPWAP data tunnel encryption using DTLS. This
configuration ensures that packets are encrypted and then transmitted over the
CAPWAP data tunnel.
CAPWAP data tunnel encryption using DTLS can be configured in both the system
view and AP system profile view. The difference is that the function configured in
the system view takes effect for APs that go online through an AC and support
this function, while the function configured in the AP system profile view takes
effect for APs configured with the AP system profile. The function in the AP
system profile view takes precedence over that in the system view. When this
function is enabled in both the views, the configuration in the AP system profile
view takes effect.
Configuration Method
Enable CAPWAP data tunnel encryption using DTLS in the AP system profile view.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-system-profile name system1
[HUAWEI-wlan-ap-system-prof-system1] capwap dtls data-link encrypt enable
Enable CAPWAP data tunnel encryption using DTLS in the system view.
<HUAWEI> system-view
[HUAWEI] capwap dtls data-link encrypt
Issue 07 (2021-08-30)
Copyright © Huawei Technologies Co., Ltd.
54
WLAN
Security Hardening Guide
4 Reference Documents
4
Reference Documents
For details about the functions described in this document, visit Huawei official
website to obtain the wireless access controller (AC and Fit AP) product
documentation.
Issue 07 (2021-08-30)
Copyright © Huawei Technologies Co., Ltd.
55
Download