05-29-2020 08:18 AM
Hi,
In my network security is always a big concern and I wonder how can I maximaze the security of adoption process and communication beetwen APs in RF Domain (common VLAN). In a standard way of adoption it is based on a MAC adress of an AP (as far as I understand MAC address is a factor that distinguish beetwen devices) whether I use auto adoption policys or static configuration on controller. But what if I want to be 100% sure that device adopted is mine and noone changed it into its own “hacked” device with spoofed MAC adress (even if this is very hypotetical situation)? Is “auto ipsec” a solution here? Or maybe somthing else? But what about mint links between APs in RF domain - the cannot be secured by ipsec. Am I right?
So the question is - is there a way to secure deployment so only devices which where in my “hands” before deployment can be adopted and form mint link/adjacencies beetwen each other in RF-domain?
If my way of thinking is wrong then correct me please
05-30-2020 10:07 PM
Hi,
Very often APs are installed on places where it is possible to reach phisicaly the device. And 802.1x is a good idea- maby the best - but problems start when switches to which APs are connected can’t support 802.1x on trunk ports. For instance my APs need to be connected to truk ports ( dynamic vlan assigment from Radius).
This is why I’m curious what can Wing do on his own to maximize security in depoyment.
Any other idea?
05-29-2020 09:13 PM
Hi,
Very interesting food for thoughts! Personally I would consider:
It is always good to think how can we contain damage if some unwanted device gets adopted or reads MINT communication or reaches the WiNG communication VLAN, but I’d try to put all efforts possible in making that VLAN isolated from unnecessary contact from non-AP/controller ports and non-MINT VLANs.
Hope that helps,
Tomasz