0% found this document useful (0 votes)
319 views3 pages

Network Security Compliance Guide

The document discusses various security best practices for a Cisco WLC including enabling 802.1x authentication on APs, configuring CPU ACLs, enabling client exclusion and signature checks, setting strong password policies, adjusting the rogue AP detection threshold, and ensuring WLANs use WPA2/AES encryption. It provides descriptions of each practice along with the commands to configure them through the Cisco Controller CLI.

Uploaded by

Budiarto
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
319 views3 pages

Network Security Compliance Guide

The document discusses various security best practices for a Cisco WLC including enabling 802.1x authentication on APs, configuring CPU ACLs, enabling client exclusion and signature checks, setting strong password policies, adjusting the rogue AP detection threshold, and ensuring WLANs use WPA2/AES encryption. It provides descriptions of each practice along with the commands to configure them through the Cisco Controller CLI.

Uploaded by

Budiarto
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Security https://wlc.mmki.co.id/bp/helpfiles/r-security.

html

Security
802.1x on AP
Description—Provides greater network security by enabling 802.1X on the AP for high security networks.
Status:
Compliant—802.1x authentication for APs is enabled
Non-Compliant—802.1x authentication for APs is disabled
CLI Option—Enable 802.1x on AP by entering this command:
(Cisco Controller) >config ap 802.1Xuser add username ap-user password password all

CPU ACLs
Description—Control overall access to the WLC
Status:
Compliant—Configured
Non-Compliant—Not configured

Client Exclusion
Description—Enables the Cisco WLC to exclude the clients from joining under specific conditions. Clicking Fix it Now
enables client exclusion for all events.
Status:
Compliant—Client exclusion is enabled for all events
Non-Compliant—Client exclusion is disabled for all events
CLI Option—Enable client exclusion for all events by entering this command:
(Cisco Controller) >config wps client-exclusion all enable

Legacy IDS
Description—Enables wireless IDS feature and 17 built-in signatures to avoid intrusion attacks. Clicking Fix it Now enables
signature check.
For this best practice to work, ensure that at least one WLAN is enabled and client exclusion-listing is enabled for the WLAN.
To enable client exclusion-listing for a WLAN, use the conf wlan exclusionlist wlan-id enabled command.
Status:
Compliant—All standard signature check is enabled
Non-Compliant—All standard signature check is disabled
CLI Option—Enable signature check by entering this command:
(Cisco Controller) >config wps signature enable

Local Management Password Policies


Description—Strong password policies should be enforced. Clicking Fix it Now enables the following strong password
policies:
case-check—Checks the occurrence of same character thrice consecutively
consecutive-check—Checks the default values or its variants are being used
default-check—Checks either username or its reverse is being used
all-checks—Enables/disables all the strong password checks
position-check—Checks four-character range from old password
case-digit-check—Checks all four combinations to be present: lower, upper, digits, and special characters
Status:

1 of 3 12/20/2022, 11:23 AM
Security https://wlc.mmki.co.id/bp/helpfiles/r-security.html

Compliant—All strong password policies are enabled


Non-Compliant—Some or no password policies are enabled
CLI Option—Enable all strong password policies by entering this command:
(Cisco Controller) >config switchconfig strong-pwd all-checks enable

Min Rogue RSSI Threshold


Description—Specifies the minimum RSSI value that rogues should have for APs to detect them and for the rogue entries to
be created in the Cisco WLC. Recommended value is –80 dBm. Clicking Fix it Now changes the minimum RSSI value that
rogues should have to –80 dBm.
Status:
Compliant—Set to –80 dBm
Non-Compliant—Set to less than –80 dBm
CLI Option—Set the minimum RSSI value that rogues should have by entering this command:
(Cisco Controller) >config rogue detection min-rssi rssi-in-dBm

Peer to Peer
Description—Peer to peer blocking function disables bridging of traffic on the same subnet between clients. This is only
recommended on high security networks where client to client communication is undesirable. Not recommended on
enterprise and voice deployments.
Status:
Compliant—Peer to peer blocking enabled on one or more WLANs
Non-Compliant—Peer to peer blocking is disabled on all WLAN
CLI Option—Enable Peer to peer blocking by entering this command :
(Cisco Controller) >config wlan peer-blocking drop wlan-id

Rogue Policies
Description—Policy should be at least High. Clicking Fix it Now sets the rogue detection security level to High.
Status:
Compliant—Policy is set to High or above
Non-Compliant—Policy is set to Custom.
Set the rogue detection security level to High by entering this command:
(Cisco Controller) >config rogue detection security-level high

SSH/Telnet Access
Description—SSH to the WLC should be enabled by default. Clicking Fix it Now enables SSH and disables Telnet to the WLC.
Status:
Compliant—SSH enabled; Telnet disabled
Non-Compliant—SSH enabled and Telnet enabled OR SSH disabled and Telnet enabled
CLI Option:
Enable SSH by entering this command:
(Cisco Controller) >config network ssh enable
Disable Telnet by entering this command:
(Cisco Controller) >config network telnet disable

User Login Policies


Description— The user login policies are provided to limit the number of concurrent logins of the local netusers of the
controller. You can limit the number of concurrent logins, and the recommendation is greater than default of 0 (unlimited).

2 of 3 12/20/2022, 11:23 AM
Security https://wlc.mmki.co.id/bp/helpfiles/r-security.html

Status:
Compliant—Configured
Non-Compliant—No user login policies are present
CLI Option:
Verify the limit of the netusers by entering this command:
(Cisco Controller) >show netuser summary
Configure user login policies by entering this command:
(Cisco Controller) >config netuser maxUserLogin count

WLAN with WPA2 or 802.1X


Description—WLAN should be using 802.1X or WPA security. There is no fix it button. Link to the WLAN page is provided.
Day 0 default does not mandate an 802.1X.
Status:
Compliant—Enabled if at least one WLAN is using 802.1X or WPA
Non-Compliant—Disabled

WLAN with WPA2 and AES Policy


Description—We recommend that you use WPA2+AES instead of WPA+AES and TKIP because WPA2+AES provides greater
security. WPA+AES is deprecated and therefore not recommended to be used.
Status:
Compliant—All WLANs configured with WPA+WPA2 have WPA2+AES security policy
Non-Compliant—All WLANs configured with WPA+WPA2 have the following security policies:
WPA+AES, WPA2+AES
WPA+AES
CLI Option—Use the following CLI to enable WPA2+AES on the WLAN :
(Cisco Controller) >config wlan security wpa enable wlan-id

3 of 3 12/20/2022, 11:23 AM

You might also like