PROTECTION FOR ANY WLAN shooting Trouble-Compliance Security TROUBLESHOOTING Solve Issues RemotelyLevel 1 Helpdesk Proactive MonitoringSpectrum AnalysisInterference DetectionLiveRF Cover
Trang 1Fortifying Wireless Networks
Trang 3Users Connecting to Neighboring Networks
Trang 4Wireless Breaches Cost Millions
Attacks are No Longer Innocent Attempts to Gain Notoriety –
Organized Crime Uses Wireless Hacking to Steal Money
Tens of Millions of Credit & Debit Card
Numbers Have Been Stolen
Average Cost of a Data Breach is $300
per Compromised Record (per Gartner)
Average Breach Cost is $6.6m
(Network World)
Average Customer Turnover
After a Breach is 3.6%
Trang 5The Reliability Issue
TECHNOLOGY
PROBLEMS
Connectivity can be Impacted by Many
Outside Factors
Much Wider Variety of Client Settings
than Wired Networks
Problems are Transient – Like the
Devices
RF is a New Technology for
Some Network Engineers
BUSINESS / ORGANIZATIONAL PROBLEMS
Wireless is the #1 Culprit – Blamed for Everything
Too Many Support Calls are Escalated to Wireless Networking Team
Tools Unavailable at Remote Sites Where Issues are Present
Site Visits are Very Expensive
Connectivity Problems Roaming Issues
Coverage & Capacity
Noise & Interference
Trang 6PROTECTION FOR ANY WLAN
shooting
Trouble-Compliance Security
TROUBLESHOOTING
Solve Issues RemotelyLevel 1 Helpdesk Proactive MonitoringSpectrum AnalysisInterference DetectionLiveRF CoverageRemote Packet CaptureHistorical Analysis
Motorola AirDefense Solution
Trang 7Motorola AirDefense Products
HEADQUARTERS
WIPS Appliance
Sensor
FIELD OFFICES
FIELD OFFICES
Motorola AirDefense Enterprise
Innovative Add-on Modules
WEP Cloaking
A Migration Step to Protect Legacy Encryption Protocols Meet PCI Requirements While Upgrading to WPA
Spectrum Analysis
Detect & Classify Common Types of
RF Interference Sources Including Microwaves, Bluetooth etc.
LiveRF
Real-time Assessment of Wireless Network Performance
Centrally Analyze
& Troubleshoot Connectivity Issues
Provides Faster Resolution of Wireless-related Issues as Well as Proactive Resolutions
Mobile Workforce Protection
End-point Security
to Protect Mobile Users Regardless
of Location
Rogue Detection & Elimination Intrusion Detection
Automated Termination Policy Compliance Wireless Troubleshooting Forensic Analysis
Location Tracking Enterprise-class Scalability
Trang 8Solution Architecture
Centralized, Hardened Appliance
Protection for WLAN
Infrastructure and Devices
Secure Layer 3 Connections
Between Sensors and Appliance
Minimal WAN Bandwidth
Needed by Sensors, < 3Kb/s
Two Types of Sensors:
Dedicated Sensors are Separate Devices,
Use One for Every 3-5 APs
Integrated Sensors are Built Into Motorola
Access Points
All Sensors Provide 24x7
Protection for Gap-free Security
NETWORK
Distributed Collaborative Architecture is Highly Scalable
Integrated AP/Sensor
FIELD OFFICE
Central Appliance
Dedicated Sensor
CORPORATE OFFICE
Trang 9Motorola AirDefense Solution
COMPLIANCE
24x7 Policy MonitoringFlexible DefinitionCustom ReportsPCI, HIPAA, GLBA, US DoD, SOX ReportsGranular Forensic Records
TROUBLESHOOTING
Solve Issues RemotelyLevel 1 Helpdesk Proactive MonitoringSpectrum AnalysisInterference DetectionLiveRF CoverageRemote Packet CaptureHistorical Analysis
PROTECTION FOR ANY WLAN
shooting
Trouble-Compliance
Security
PROTECTION FOR ANY WLAN
shooting
Trouble-Compliance Security
TROUBLESHOOTING
Solve Issues RemotelyLevel 1 Helpdesk Proactive MonitoringSpectrum AnalysisInterference DetectionLiveRF CoverageRemote Packet CaptureHistorical Analysis
Trang 10Eliminate Rogues on the Network
Differentiate Between Neighbors
and Rogue Devices Automatically
Identify Every Type of Rogue
Device Connected to the Network
Historical Record of
Associations & Traffic
Automatic Elimination
Automatically Finds and Removes All Rogue Devices
REMOTE OFFICE NEIGHBOR DETECT - ANALYZE - ELIMINATE
Dedicated Sensor
Open Rogue AP
Encrypted Rogue AP
Rogue AP Behind Firewall
Soft AP
Rogue Devices Can be Anywhere on the Network
and can be Encrypted
Trang 11Comprehensive Intrusion Detection
Sensors
PROTOCOL ABUSE ANOMALOUS BEHAVIOR
SIGNATURE ANALYSIS MANAGER POLICY
Correlation Engines Context-Aware
Detection Engines
200+ Threats Detected
Reconnaissance & Probing Denial of Service Attacks Identity Thefts, Malicious Associations Dictionary Attacks; Security
Policy Violations
Minimal False Positives
Correlation Across Multiple Detection Engines Reduces False Positives Most Accurate Attack Detection
Powerful Detection with Minimal False Positives
DETECTION
AIRDEFENSE SERVER APPLIANCE
Trang 12Automated Wireless Protection
Wireless Termination
Targeted Disruption of Wireless Connections
No Impact to Allowed Network Traffic Compliant with Applicable Laws & FCC Regulations
Wired Port Suppression
Search Wired Network to Locate the Switch-port
a Rogue Threat is Attached to Safeguards Ensure Only Threat is Disconnected
Wireless ACL
Prevent Wireless Stations from Connecting
to the WLAN
Sensor WIPS Appliance
Switch
Laptop
Neighboring AP APs
Wireless Station AP
Terminated:
Accidental Association
Port Suppressed:
Rogue AP ACL Enforced: Rogue Station
Comprehensive Threat Mitigation that is Powerful & Safe to Use
Trang 13Forensic Analysis
Extensive Forensic Data
Months of Historical Data Accessible
from System
325+ Statistics per Device per Minute
Device Connectivity & Activity Logs
Valuable Business Information
Accurate Records for Forensic Analysis &
Policy Compliance Reporting
Determine Exact Time & Impact of
Attempted Attacks
Record of Wireless Performance and
Connectivity Issues
FORENSIC SUMMARY
ASSOCIATION ANALYSIS
Unrivaled Visibility into Network Activity & Threats
Trang 14Advanced Forensics Module
Detailed Forensic Analysis
Graphical View of Minute-by-minute Stats
Device, Threats, Associations, Traffic,
Signal and Location Tends
Adjustable Time Windows
Historical Location Tracking
Network Trend Analysis
Forensic Analysis and Audit Support
Allows Historical Analysis of Intermittent
Wireless Problems
Quickly View Performance / Security
Trends Over Time
TRAFFIC ANALYSIS
EVENT SEQUENCE
Trang 15Motorola AirDefense Solution
PROTECTION FOR ANY WLAN
shooting
TROUBLESHOOTING
Solve Issues RemotelyLevel 1 Helpdesk Proactive MonitoringSpectrum AnalysisInterference DetectionLiveRF CoverageRemote Packet CaptureHistorical Analysis
PROTECTION FOR ANY WLAN
shooting
Trouble-Compliance
Security
PROTECTION FOR ANY WLAN
shooting
Trouble-Compliance Security
Trang 16Automated Wireless Scanning and
Rogue Wireless Elimination
Wireless Intrusion Prevention
Encryption Policy Enforcement
Location Tracking Mandatory
Health Insurance Portability and Accountability Act (HIPAA )
Encryption Validation Security Configuration Management
HIPAA Compliance Reports
Sarbanes Oxley (SOX) Compliance Gramm-Leach-Bliley Act (GLBA) Protect Confidentiality and
Integrity of Corporate Data Transmitted Wirelessly Reporting and Audit Support
Regulatory Compliance ≠ WLAN Security
Trang 17Policy Compliance & Reporting
Fully Customizable Reporting and Dedicated Monitoring of
Policy Compliance and Network Performance
Trang 18Motorola AirDefense Solution
TROUBLESHOOTING
Solve Issues RemotelyLevel 1 Helpdesk Proactive MonitoringSpectrum AnalysisInterference DetectionLiveRF CoverageRemote Packet CaptureHistorical Analysis
PROTECTION FOR ANY WLAN
shooting
Trouble-Compliance
Security
PROTECTION FOR ANY WLAN
shooting
Trouble-Compliance Security
Trang 19PAST PRESENT FUTURE
AP Testing Policy Compliance Performance Policy
REAL-TIME TROUBLESHOOTING TOOLS
LiveView Connectivity Troubleshooting
AP Testing Spectrum Analysis LiveRF
End-user Feedback Performance Alarms & Reports
Centralized WLAN Troubleshooting
Remote Troubleshooting
Trang 20Remote Visibility with LiveView
Real-time View of WLAN
Turn Any Sensor into a ‘Sniffer’
Full Layer 2 Frame Capture
Visualize Wireless Traffic Flow
28 Different Graphical Views
Low Network Support Costs
Real-time View of Remote WLAN
Advanced Centralized Troubleshooting
Reduced on-site Support Cost
Increased WLAN Uptime
Remote WLAN Troubleshooting with Real-time Analysis
FRAME CAPTURE
REAL-TIME TRAFFIC
CONNECTION ANALYSIS
Trang 21Advanced Troubleshooting Module
Connection Troubleshooting
Designed for Level 1 Helpdesk
Quickly Determine if it is a Wireless or
Wired Network Issue
Simple Debugging of Wireless Issues
Escalation Only if Necessary
Centralized Troubleshooting
AP Connectivity Test
Proactively Test One or More APs
Find Problems Before Disruption
Analyze Wireless and Wired Network
from Clients Perspective
Schedule Automatic Tests
Test Access to Wired Applications
Secure Server
WAN
DHCP Server
Application Server
DATA CENTER REMOTE LOCATION
Trang 22Spectrum Analysis Module
Physical Layer
Troubleshooting
Detect non-802.11 Interference –
Microwaves, Bluetooth, Frequency
Hopping Devices etc
2.4 and 5 GHz Band Support
Remote Real-time Spectrograms
Automated
Interference Detection
Use Existing Sensors – No
Special Hardware Needed
Remote Detection of Interference
Automatic Interference Alarms
Improve Wireless Performance
FULL SCAN
CLASSIFY INTERFERENCE SOURCES
Trang 23Coverage Mapping – LiveRF Module
Understand Wireless Coverage
& Impact on Applications
Real-time RF coverage analysis
Building Aware Prediction of Coverage
and Capacity
Application Specific Simulations
– Voice, Video, Data
Centralized and Remote Analysis
VIEW SIGNAL COVERAGE FOR APPLICATIONS
COVERAGE CHANGE WITH INTERFERER
Wireless Camera Used as Interference
Source Comparison of VoIP
Coverage
Trang 24AirDefense – The Proven Solution
AirDefense Rated ‘POSITIVE’
Largest Overlay WIPS Vendor
Highest Level of Visibility
Most Detailed Wireless Activity Data
BEST WIRELESS
RECOGNIZED
AirDefense Owns WIPS IP - 28 Patents NIAP Common Criteria Certified
Validated and Deployed by Very Security Sensitive Organizations – US Army, DoD, FAA, NSA, FBI, DoE, DHS, etc.
Most Scalable Wireless Monitoring Platform MarketScope for Wireless LAN
Intrusion Prevention Systems
Trang 25Return on Investment
AirDefense Enterprise has a Positive ROI within a Year
Cost of a Data Breach is $200-$300 per Record
According to Gartner, Prevention Cost is About 5% the Cost of the Data Breach
SECURITY
Cost of on-site Wireless Scanning can be $270-$900 per Visit
Manually Classifying Wireless Devices as Rogues or Neighbors is Error-prone
AirDefense Generates Automatic Wireless Compliance Reports with Forensics
COMPLIANCE
TROUBLESHOOTING
Cost of on-site Wireless Troubleshooting can be Over $1000 per Visit
Remote Troubleshooting Improves Wireless Availability and Reduces Downtime
AirDefense Enterprise Resolves Over 70% of Wireless Trouble Tickets Remotely
Trang 26WIRELESS SECURITY IS PARAMOUNT
Cost of a Data Breach Can be $200-$300 Per Record
Several Recent Data Breaches Have Happened Over Wireless
CENTRALIZED WIRELESS MONITORING NEEDED
Rogue Wireless Access and Wireless Attacks on the Rise
Significant OPEX in Resolving WLAN Connectivity and Performance Problems
MOTOROLA AIRDEFENSE DEDICATED WIPS OFFERS
Automated Elimination of All types of Rogue Wireless Devices
Detection of 200+ Attacks and Policy Violations
Centralized, Advanced Troubleshooting of Wireless Connectivity Issues
Wireless Compliance Validation and Reporting
Standalone, Vendor Agnostic Deployments
Integrated Deployment with Motorola WLAN – Common AP + Sensor Hardware, Integrated Management
Trang 27Appendix
Trang 28Legacy Encryption Protection Module
WEP Cloaking
Protect Legacy WEP WLAN
Provide Secure and Compliant Upgrade Path
No AP or Client Updates
Minimal Impact on WLAN Performance
Validated Compensating Control for
PCI Compliance
Increase ROI from Legacy WLAN
Protect Legacy WEP Devices Prior to Upgrade
Legacy WEP WLAN Blocked Hacker
AirDefense Sensor Mobile Device
AP
Laptop
Trang 29Motorola AirDefense Personal
Mobile Workforce Protection
Protect Mobile Laptops from Wireless Attacks
Centralized Policy Enforcement for all Wireless Networks – Wi-Fi and Cellular
Small Laptop Client Agent Communicating with Central Appliance
Centralized Notification of Attacks and Policy Violations
Disable Simultaneous Wireless and Wired Access
Works in Tandem with Personal Firewalls and Host Based IDS
CENTRALLY-DEFINED POLICIES
ALERTS Personal Agents
WIPS Appliance
Policy
Enforcement
Central Reporting &
Notification
INTERNET
Trang 303.4GHz Intel® Pentium® 4 2.13GHz Intel® Core TM 2 Duo 2.33GHz Intel® Xeon® 5140 Dual-core
1U Form Factor,16” Depth 1U Form Factor,16” Depth 2U Form Factor, 21.5” Depth
Optimized for the Analysis
and Storage of Wireless
Network Statistics
Large Hard Disk Drives
Store Large Amount of
Trang 31M520 Sensor
Dedicated Remote
802.11a/b/g Sensor
Supports all AirDefense
Enterprise Add-on Modules
Advanced Troubleshooting
Spectrum Analysis
WEP Cloaking
Model 520 Radios Dual Radio: a & b/g
Radio Receive Sensitivity -93dBm @ 1Mbps (802.11b) -88dBm @ 6Mbps (802.11g)
-88dBm @ 6Mbps (802.11a)
2.4GHz Band 2.412 - 2.484 GHz
5GHz Band 802.11j, UNII 1-2-3, Hyperlan, ISM
Extended Channel Scan 4.9 - 6.1GHz in 5GHz increments
Antenna Dual-band Omni-directional
Antennas
Antenna Gain +2dBi (2.4GHz)
+5dBi (5GHz)
Removable Antenna External RP-SMA Connectors
Mounting Options Ceiling & Wall Mount (Brackets
Included)
Power-over-ethernet 802.3af Compliant
Environmental Operating: 0 to 55 °C (32 to 131 °F)
Storage: -20 to 70 °C (-4 to 158 °F) Humidity: 10%~95% Typical
Housing Metal, Plenum Rated
Certifications FCC, UL/CSA, CE, RoHS
`
Trang 32Combined AP & Sensor
Configure Motorola Dual-radio
APs to Use One Radio for
Dedicated WIPS Sensing
Band Un-locked – AP and Sensor
can be on the Same Band (2.4 of 5
GHz) at the Same Time
Reduced Deployment Cost – No
Overlay Sensor Deployment
AP Does not Have to Time-slice
for Part-time Sensing, Better Data
Performance and QoS
Collaboration Between AP and
Sensor Radios for Improved
Statistics Collection (e.g RSSI for
Location Tracking)
Industry’s First Concurrent, Band-Unlocked, Full-time
AP + Dedicated Sensor
Trang 33Cost-effective 802.11 a/b/g wireless
connectivity and sensing capabilities
Model 300
2.4GHz band 2.412 - 2.484 GHz*
5GHz band 802.11j, ISM*
Antenna Internal and external antenna options
Mounting options Ceiling & Wall Mount (no Additional
Hardware Required)
Power-over-Ethernet 802.3af Compliant
Environmental* Operating: 0 to 40 °C (32 to 104 °F)
Storage: -40 to 70 °C (-40 to 158 °F) Humidity: 5%~95% Non-condensing
Certifications FCC, CE, RoHS,TELEC
Configurable as an AP or a sensor
Manageable from Motorola
wireless switches
*Applies to external antenna version
Trang 34Industry’s First Concurrent,
Band-Unlocked, Full-time AP +
Dedicated Sensor
Sensor & AP Functionality
with Same Firmware Image
Mesh Capable
Configure Motorola Dual-radio
APs to Use One Radio for
Dedicated WIPS Sensing
Ruggedized Outdoor Version
AP-5181 Available
Trang 35Sensor & AP Functionality
with Same Firmware Image
Configure Motorola Dual-radio
APs to Use One Radio for
Dedicated WIPS Sensing
Fully DFS Compliant Draft
2.0 802.11n Chipset
Spectrum Analysis & AP Logon
Functionality Planned for Q3’09
Integrated 6-element Antenna
Façade or External Antennas
Model 7131 Radios Single, Dual or Tri a/g/n Radio(s)
(Band-unlocked)
2.4GHz band 2.412 - 2.484 GHz*
5GHz band 802.11j, UNII 1-2-3, Hyperlan, ISM*
Antenna Integrated Antenna Façade or
External Dual-band, Directional Antennas
Omni-Removable antenna External RP-SMA Connectors
Mounting options Ceiling & Wall Mount (no Additional
Hardware Required)
Power-over-Ethernet 802.3af Compliant, 802.3at (draft)
Environmental Operating: -20 to 50 °C(-4 to 122 °F)
Storage: -40 to 70 °C (-40 to 158 °F) Humidity: 5%~95% Non-condensing
Housing Metal Enclosure (Plenum Rated)
with Optional Plastic Facade
Certifications FCC, UL/CSA, CE, RoHS