CIS Cisco Wireless LAN Controller 7 Benchmark Imported v1.1.0
CIS Cisco Wireless LAN Controller 7 Benchmark Imported v1.1.0
Controller 7 Benchmark
[imported]
v1.1.0 - 12-04-2023
Terms of Use
Please see the below link for our current terms of use:
https://www.cisecurity.org/cis-securesuite/cis-securesuite-membership-terms-of-use/
Page 1
Table of Contents
Terms of Use ................................................................................................................. 1
Table of Contents .......................................................................................................... 2
Overview ........................................................................................................................ 4
Intended Audience................................................................................................................. 4
Consensus Guidance ............................................................................................................ 5
Typographical Conventions .................................................................................................. 6
Recommendation Definitions ....................................................................................... 7
Title ......................................................................................................................................... 7
Assessment Status................................................................................................................ 7
Automated .............................................................................................................................................. 7
Manual ..................................................................................................................................................... 7
Profile ..................................................................................................................................... 7
Description ............................................................................................................................. 7
Rationale Statement .............................................................................................................. 7
Impact Statement ................................................................................................................... 8
Audit Procedure ..................................................................................................................... 8
Remediation Procedure......................................................................................................... 8
Default Value .......................................................................................................................... 8
References ............................................................................................................................. 8
CIS Critical Security Controls® (CIS Controls®) ................................................................... 8
Additional Information........................................................................................................... 8
Profile Definitions .................................................................................................................. 9
Acknowledgements ..............................................................................................................10
Recommendations ...................................................................................................... 11
Appendix: Summary Table ......................................................................................... 45
Appendix: CIS Controls v7 IG 1 Mapped Recommendations ...... Error! Bookmark not
defined.
Appendix: CIS Controls v7 IG 2 Mapped Recommendations ...... Error! Bookmark not
defined.
Appendix: CIS Controls v7 IG 3 Mapped Recommendations ...... Error! Bookmark not
defined.
Appendix: CIS Controls v7 Unmapped Recommendations ......... Error! Bookmark not
defined.
Page 2
Appendix: CIS Controls v8 IG 1 Mapped Recommendations ...... Error! Bookmark not
defined.
Appendix: CIS Controls v8 IG 2 Mapped Recommendations ...... Error! Bookmark not
defined.
Appendix: CIS Controls v8 IG 3 Mapped Recommendations ...... Error! Bookmark not
defined.
Appendix: CIS Controls v8 Unmapped Recommendations ......... Error! Bookmark not
defined.
Appendix: Change History ......................................................................................... 47
Page 3
Overview
All CIS Benchmarks focus on technical configuration settings used to maintain and/or
increase the security of the addressed technology, and they should be used in
conjunction with other essential cyber hygiene tasks like:
• Monitoring the base operating system for vulnerabilities and quickly updating with
the latest security patches
• Monitoring applications and libraries for vulnerabilities and quickly updating with
the latest security patches
In the end, the CIS Benchmarks are designed as a key component of a comprehensive
cybersecurity program.
This document, Security Configuration Benchmark for Cisco Wireless LAN Controllers,
provides prescriptive guidance for establishing a secure configuration posture for Cisco
Wireless LAN Controller firmware version 7.2. This guide was tested against Cisco
Wireless LAN Controller firmware v7.2.103.0. To obtain the latest version of this guide,
please visit http://benchmarks.cisecurity.org. If you have questions, comments, or have
identified ways to improve this guide, please write us at [email protected].
Intended Audience
This benchmark is intended for system and application administrators, security
specialists, auditors, help desk, and platform deployment personnel who plan to
develop, deploy, assess, or secure solutions that incorporate Cisco IOS on a Cisco
routing and switching platforms.
Page 4
Consensus Guidance
This CIS Benchmark was created using a consensus review process comprised of a
global community of subject matter experts. The process combines real world
experience with data-based information to create technology specific guidance to assist
users to secure their environments. Consensus participants provide perspective from a
diverse set of backgrounds including consulting, software development, audit and
compliance, security research, operations, government, and legal.
Each CIS Benchmark undergoes two phases of consensus review. The first phase
occurs during initial Benchmark development. During this phase, subject matter experts
convene to discuss, create, and test working drafts of the Benchmark. This discussion
occurs until consensus has been reached on Benchmark recommendations. The
second phase begins after the Benchmark has been published. During this phase, all
feedback provided by the Internet community is reviewed by the consensus team for
incorporation in the Benchmark. If you are interested in participating in the consensus
process, please visit https://workbench.cisecurity.org/.
Page 5
Typographical Conventions
The following typographical conventions are used throughout this guide:
Convention Meaning
Page 6
Recommendation Definitions
The following defines the various components included in a CIS recommendation as
applicable. If any of the components are not applicable it will be noted or the
component will not be included in the recommendation.
Title
Concise description for the recommendation's intended configuration.
Assessment Status
An assessment status is included for every recommendation. The assessment status
indicates whether the given recommendation can be automated or requires manual
steps to implement. Both statuses are equally important and are determined and
supported as defined below:
Automated
Represents recommendations for which assessment of a technical control can be fully
automated and validated to a pass/fail state. Recommendations will include the
necessary information to implement automation.
Manual
Represents recommendations for which assessment of a technical control cannot be
fully automated and requires all or some manual steps to validate that the configured
state is set as expected. The expected state can vary depending on the environment.
Profile
A collection of recommendations for securing a technology or a supporting platform.
Most benchmarks include at least a Level 1 and Level 2 Profile. Level 2 extends Level 1
recommendations and is not a standalone profile. The Profile Definitions section in the
benchmark provides the definitions as they pertain to the recommendations included for
the technology.
Description
Detailed information pertaining to the setting with which the recommendation is
concerned. In some cases, the description will include the recommended value.
Rationale Statement
Detailed reasoning for the recommendation to provide the user a clear and concise
understanding on the importance of the recommendation.
Page 7
Impact Statement
Any security, functionality, or operational consequences that can result from following
the recommendation.
Audit Procedure
Systematic instructions for determining if the target system complies with the
recommendation
Remediation Procedure
Systematic instructions for applying recommendations to the target system to bring it
into compliance according to the recommendation.
Default Value
Default value for the given setting in this recommendation, if known. If not known, either
not configured or not defined will be applied.
References
Additional documentation relative to the recommendation.
Additional Information
Supplementary information that does not correspond to any other field but may be
useful to the user.
Page 8
Profile Definitions
The following configuration profiles are defined by this Benchmark:
• Level 1
• Level 2
This profile extends the "Level 1" profile. Items in this profile exhibit one or more
of the following characteristics:
Page 9
Acknowledgements
This Benchmark exemplifies the great things a community of users, vendors, and
subject matter experts can accomplish through consensus collaboration. The CIS
community thanks the entire consensus team with special recognition to the following
individuals who contributed greatly to the creation of this guide:
Author
Brian Sak
Contributor
Sergey Pavlov
Justin Opatrny
Rael Daruszka
Steven Piliero
Page 10
Recommendations
1 Wireless LAN Controller
This section prescribes controls to secure wireless termination points and access
controllers in a wireless system.
Page 11
1.1 Install the Latest Firmware (Automated)
Profile Applicability:
• Level 1
Description:
The Wireless LAN Controllers should be upgraded to the latest firmware to resolve any
discovered security vulnerabilities.
Rationale:
Wireless LAN Controllers running firmware with documented vulnerabilities could be
subject to attacks including ones that may allow for unauthorized configuration changes
or denial of service.
Audit:
Validate that the running Product Version is the same as the latest released version.
1. Run the following command to display the running Product Version:
1. http://www.cisco.com/en/US/docs/wireless/controller/7.0/command/reference/cli7
0commands.html#wp1320208
Additional Information:
PCI DSS §2.11 §4.2
Page 12
1.2 Ensure 'Password Strength' is Strong for configured 'User
Names' (Automated)
Profile Applicability:
• Level 1
Description:
This control determines if local administrative passwords meet minimum complexity
requirements and are determined as "strong" by the Wireless LAN Controller. To meet
the "strong" requirement the selected password must meet the following criteria:
Rationale:
Password complexity for administrative accounts reduces the risk of an attacker
guessing the password. An attacker could gain unauthorized access to the Wireless
LAN Controller by guessing a weak password.
Audit:
1. Perform the following to determine if the local management users are configured to
use strong passwords.
Page 13
The new password can be applied using:
(Cisco Controller) ><strong>config mgmtuser password</strong> <username>
<password>
Additional Information:
PCI DSS § 8.5.10.a §4.2
Page 14
1.3 Delete the 'User Name' admin (Automated)
Profile Applicability:
• Level 1
Description:
This control determines if the default system usernames and passwords have been
removed. The recommended setting is to delete admin (default account).
Rationale:
Default usernames and passwords are known to attackers and could allow unauthorized
administrative access or to change the configuration of Access Points and/or the
Wireless LAN Controller. The default is username is admin with a default password of
admin.
Audit:
1. Perform the following to determine the local management users configured on the
Access Controller.
Remediation:
New management users can be configured using the following command.
References:
1. http://www.cisco.com/en/US/docs/wireless/controller/7.0/command/reference/cli7
0commands.html#wp7649595
Page 15
Additional Information:
PCI DSS § 2.1.1.c § 4.2
PCI DSS Wireless Guidelines - Section 4.2 - Change Default Settings and Securely
Configure Wireless Devices
PCI DSS Requirement - Section 2.1.1 - For wireless environments connected to the
cardholder data environment or transmitting cardholder data, change wireless vendor
defaults, including but not limited to default wireless encryption keys, passwords, and
SNMP community strings.
Page 16
1.4 Ensure 'Telnet' is disabled (Automated)
Profile Applicability:
• Level 1
Description:
This control determines whether the device allows administration via the telnet protocol.
The recommended setting is telnet disabled.
Rationale:
Administrative access to the controller should be allowed only using cryptographically
secure access methods. Unsecured administrative access methods, such as telnet, do
not encrypt traffic between the client and the administrative interface. This could allow
for interception or manipulation of the administrative session or capture of administrative
credentials.
Audit:
Perform the following to determine if telnet is enabled.
1. Run the command below:
Telnet...................................... Disable
Remediation:
1. Disable command-line administration through telnet.
References:
1. http://www.cisco.com/en/US/docs/wireless/controller/7.0/command/reference/cli7
0commands.html#wp1319452
Additional Information:
PCI DSS §1.1.1 §4.2.1.e
Page 17
PCI DSS Wireless Guidelines - Section 4.2.1 - Change Default Settings and Securely
Configure Wireless Devices - Network Protocols and Identifiers
PCI DSS Requirement - Section 2.1.1 - For wireless environments connected to the
cardholder data environment or transmitting cardholder data, change wireless vendor
defaults, including but not limited to default wireless encryption keys, passwords, and
SNMP community strings.
Page 18
1.5 Ensure 'Webmode' is disabled (Automated)
Profile Applicability:
• Level 1
Description:
This control determines whether the device allows administration via webmode. The
recommended setting is network webmode disabled.
Rationale:
Administrative access to the controller should only be allowed using cryptographically
secure access methods. Unsecured administrative access methods, such as Hypertext
Transfer Protocol (HTTP), do not encrypt traffic between the client and the
administrative interface. This could allow for interception or manipulation of the
administrative session or capturing administrative credentials. Enable Secure Shell
Version 2 (SSHv2) or Hypertext Transfer Protocol Secure (HTTPS) for administration.
The default setting is enabled.
Audit:
Perform the following to determine if telnet is enabled.
1. Run the command below:
Webmode...................................... Disable
Remediation:
1. Disable administration through webmode.
References:
1. http://www.cisco.com/en/US/docs/wireless/controller/7.0/command/reference/cli7
0commands.html#wp1319452
Additional Information:
PCI DSS §1.1.1 §4.2.1.e
Page 19
PCI DSS Wireless Guidelines - Section 4.2.1 - Change Default Settings and Securely
Configure Wireless Devices - Network Protocols and Identifiers
PCI DSS Requirement - Section 2.1.1 - For wireless environments connected to the
cardholder data environment or transmitting cardholder data, change wireless vendor
defaults, including but not limited to default wireless encryption keys, passwords, and
SNMP community strings.
Page 20
1.6 Disable 'Management via Wireless Interface' (Automated)
Profile Applicability:
• Level 1
Description:
This control determines whether wireless clients can manage only the Cisco wireless
LAN controller associated with the client and the associated Cisco lightweight access
point. That is, clients cannot manage another Cisco wireless LAN controller with which
they are not associated. The recommended setting is network mgmt-via-wireless
disabled.
Rationale:
Administrative access should not be allowed from wireless clients because the wireless
client is mobile; it can be stolen, misplaced, or lent to an unauthorized user. Allowing
administrative access from the wireless network increases the possibility of an attacker
gaining access to the admin interface. The default setting for mgmt-via-wireless is
enabled.
Audit:
Perform the following to determine if administrative access is allowed from wireless
clients.
1. Run the command below:
Remediation:
Disable access to the admin interface from wireless clients using the following
command.
References:
1. http://www.cisco.com/en/US/docs/wireless/controller/7.0/command/reference/cli7
0commands.html#wp1324232
Additional Information:
PCI DSS §2.3 §4.1
Page 21
1.7 Ensure the 'CLI Login Timeout (minutes)' is less than or equal
to 5 (Automated)
Profile Applicability:
• Level 2
Description:
This control determines how long a command-line session will stay idle before it is
logged out. The recommended setting is 5 minutes or less, but not set to zero.
Rationale:
Command-line sessions timeout after a period of inactivity to reduce the risk of an
unauthorized individual taking over an unattended, authenticated session. Validate that
the inactivity timeout for CLI session's has not been set for more than the default or
disabled altogether. The default inactivity timeout is 5 minutes.
Audit:
Validate the currently configured inactivity timeout.
1. Run the following command:
Remediation:
Reset the default authentication timeout value to 5 minutes.
References:
1. http://www.cisco.com/en/US/docs/wireless/controller/7.0/command/reference/cli7
0commands.html#wp1319842
Page 22
1.8 Ensure 'SNMP v1 Mode' is disabled (Automated)
Profile Applicability:
• Level 1
Description:
This control determines whether or not Simple Network Management Protocol Version 1
(SNMP v1) can be used for remote network management. The recommended setting is
disabled.
Rationale:
Simple Network Management Protocol Version 1 (SNMPv1) is not encrypted and is
authenticated using a shared password. Encryption thwarts eavesdropping and
attempts to manipulate network management protocols.
Audit:
Perform the following to determine which versions of Simple Network Management
Protocol are enabled on the Wireless LAN Controller.
1. Run the following command:
Remediation:
Disable SNMP version v1
References:
1. http://www.cisco.com/en/US/docs/wireless/controller/7.0/command/reference/cli7
0commands.html#wp1319918
Additional Information:
PCI DSS §10.2 §4.2
PCI DSS Wireless Guidelines - Section 4.2.1 - Change Default Settings and Securely
Configure Wireless Devices - Network Protocols and Identifiers
Page 23
PCI DSS Requirement - Section 2.1.1 - For wireless environments connected to the
cardholder data environment or transmitting cardholder data, change wireless vendor
defaults, including but not limited to default wireless encryption keys, passwords, and
SNMP community strings.
Page 24
1.9 Ensure 'SNMP v2c Mode' is disabled (Automated)
Profile Applicability:
• Level 1
Description:
This control determines whether Simple Network Management Protocol version 2c
(SNMP v2) can be used for remote network management. The recommended setting is
disabled.
Rationale:
Simple Network Management Protocol Version 2c is not encrypted and is authenticated
using a shared password. Encryption thwarts eavesdropping and attempts to
manipulate network management protocols.
Audit:
Perform the following to determine which versions of SNMP are enabled on the
Wireless LAN Controller.
1. Run the following command:
Remediation:
Disable SNMP version v2c
References:
1. http://www.cisco.com/en/US/docs/wireless/controller/7.0/command/reference/cli7
0commands.html#wp1319918
Additional Information:
PCI DSS §10.2 §4.2
PCI DSS Wireless Guidelines - Section 4.2.1 - Change Default Settings and Securely
Configure Wireless Devices - Network Protocols and Identifiers
Page 25
PCI DSS Requirement - Section 2.1.1 - For wireless environments connected to the
cardholder data environment or transmitting cardholder data, change wireless vendor
defaults, including but not limited to default wireless encryption keys, passwords, and
SNMP community strings.
Page 26
1.10 Delete the 'SNMP v3 User Name' default (Automated)
Profile Applicability:
• Level 1
Description:
This control determines whether the default Simple Network Management Protocol
Version 3 (SNMPv3) username included in the default configuration has been removed.
The recommended setting is to delete the SNMP v3 User Name default.
Rationale:
Default username and password combinations are known to attackers and could be
used to gain unauthorized access to the Wireless LAN Controller. SNMPv3 is disabled
by default, however if enabled could allow unauthorized configuration changes using the
default user.
Audit:
Validate that the default Simple Network Management Protocol Version 3 user does
not exist.
1. Run the following command:
Remediation:
Delete the default Simple Network Management Protocol Version 3 user.
Page 27
(Cisco Controller) ><strong>config snmp v3user create</strong> <username>
<ro/rw> <authentication type> <encryption type> <authentication key>
<encryption key>
References:
1. http://www.cisco.com/en/US/docs/wireless/controller/7.0/command/reference/cli7
0commands.html#wp1319901
Page 28
1.11 Configure 'an authorized IP Address' for 'Logging Syslog
Host' (Automated)
Profile Applicability:
• Level 1
Description:
This control determines if the Wireless LAN Controller is configured to send logging
information to a centralized syslog server for processing and alerting. The
recommended setting is to configure an authorized IP address for logging syslog.
Rationale:
Logging should be enabled on Wireless Termination Points and Access Controllers to
detect access attempts, configuration changes, and system level events. Logs should
be centrally collected and reviewed on a regular basis. It is recommended that logging
is enabled on all devices and archived for a minimum of 12 months with 90 days of logs
to be immediately available. Logging of wireless activity and administrative access is
essential to detect anomalies and attacks on and from the wireless network.
Audit:
Validate that logging is enabled and a syslog host is defined. This can be done using
one of two methods.
Method 1
1. Run the command below:
Logging to syslog :
- Number of remote syslog hosts.................. 1
- Host 0....................................... <IP Address>
Method 2
1. Show the running configuration to the screen using the following command:
Remediation:
To enable external logging to a syslog server execute the following command:
Page 29
(Cisco Controller) ><strong>config logging syslog host </strong><IP Address>
References:
1. http://www.cisco.com/en/US/docs/wireless/controller/7.0/command/reference/cli7
0commands.html#wp5110363
Additional Information:
PCI DSS §10.2.2 §4.3
PCI DSS Wireless Guidelines - Section 4.3 - Wireless Intrusion Prevention and Access
Logging PCI DSS Requirement - Section 11.4 - Use intrusion-detection systems, and/or
intrusion-prevention systems to monitor all traffic at the perimeter of the cardholder data
environment as well as at critical points inside of the cardholder data environment, and
alert personnel to suspected compromises. Keep all intrusion-detection and prevention
engines, baselines, and signatures up-to-date.
Page 30
1.12 Configure 'an authorized IP Address' for 'NTP Server'
(Automated)
Profile Applicability:
• Level 2
Description:
This control determines if Network Time Protocol is configured to synchronize time from
an authorized external time source to the Wireless LAN Controller.
Rationale:
Network Time Protocol is configured on the Wireless LAN Controller to synchronize the
local time with an external time source. Consistent, accurate time is important for
certificate validation, logging, and forensic analysis. Network Time Protocol is not
configured by default.
Audit:
1. Perform the following to determine if NTP is enabled.
Remediation:
Configure an authorized IP address for time NTP Server.
References:
1. http://www.cisco.com/en/US/docs/wireless/controller/7.0/command/reference/cli7
0commands.html#wp2505839
Page 31
Additional Information:
PCI DSS Wireless Guidelines - Section 4.2.3 - Change Default Settings and Securely
Configure Wireless Devices -
PCI DSS §10.4 §4.2
Recommendations
PCI DSS Requirement - Section 2.1.1 - For wireless environments connected to the
cardholder data environment or transmitting cardholder data, change wireless vendor
defaults, including but not limited to default wireless encryption keys, passwords, and
SNMP community strings.
Page 32
1.13 Ensure 'Signature Processing' is enabled (Automated)
Profile Applicability:
• Level 1
Description:
This control determines whether Intrusion Detection System (IDS) signature processing
is enabled for all IDS signatures. The recommended setting is enabled.
Rationale:
Wireless Protection Policies are a basic set of signatures that can detect attacks on the
wireless network or clients. The Wireless LAN Controller can monitor the RF spectrum
and detect attackers attempting to compromise or manipulate wireless networks. The
Wireless LAN Controller should be configured to detect rogue Access Points or attacks
on the wireless infrastructure or wireless clients. By default Protection Policies are not
enabled.
Audit:
To validate that Wireless Protection Signature Policy Processing is enabled,
1. Run the following command:
Signature Policy
Signature Processing........................... Enabled
Remediation:
Enable all Wireless Protection Policies.
References:
1. http://www.cisco.com/en/US/docs/wireless/controller/7.0/command/reference/cli7
0commands.html#wp6871472
Additional Information:
PCI DSS §11.1 §3.2
Page 33
PCI DSS Wireless Guidelines - Section 4.3 - Wireless Intrusion Prevention and Access
Logging
PCI DSS Requirement - Section 11.4 - Use intrusion-detection systems, and/or
intrusion-prevention systems to monitor all traffic at the perimeter of the cardholder data
environment as well as at critical points inside of the cardholder data environment, and
alert personnel to suspected compromises. Keep all intrusion-detection and prevention
engines, baselines, and signatures up-to-date.
Page 34
1.14 Enable 'all' Policies for 'wps client-exclusion' (Automated)
Profile Applicability:
• Level 2
Description:
This control determines the client exclusion policies that are enforced when clients
attempt to associate with the device:
• 802.11-assoc excludes clients on the sixth 802.11 association attempt, after five
consecutive failures,
• 802.11-auth excludes clients on the sixth 802.11 authentication attempt, after
five consecutive failures,
• 802.1x-auth excludes clients on the sixth 802.11X authentication attempt, after
five consecutive failures,
• ip-theft excludes clients if the IP address is already assigned to another device,
• web-auth excludes clients on the fourth web authentication attempt, after three
consecutive failures,
• all excludes clients for all of the above reasons.
Page 35
Client Exclusion Policy
Excessive 802.11-association failures.......... Enabled
Excessive 802.11-authentication failures....... Enabled
Excessive 802.1x-authentication................ Enabled
IP-theft....................................... Enabled
Excessive Web authentication failure........... Enabled
Remediation:
Enable the Client Exclusion Policies:
References:
1. http://www.cisco.com/en/US/docs/wireless/controller/7.0/command/reference/cli7
0commands.html#wp9541897
Page 36
1.15 Ensure 'Rogue Location Discovery Protocol' is enabled
(Automated)
Profile Applicability:
• Level 2
Description:
This control determines whether the device will generate an alarm only, or automatically
contain a rogue access point that is advertising your network's service set identifier
(SSID).
Rationale:
Rogue Access Points that do not require authentication or encryption could allow
unauthorized or malicious users to connect to the network. Rogue Location Discovery
Protocol can actively seek out these Rogue Access Points and alert administrators to
their existence after validating that they are connected to the network. By default RLDP
is not enabled.
Audit:
Validate that Rogue Location Discovery Protocol is enabled.
1. Execute the following command:
Remediation:
Enable the Rogue Location Discovery Protocol:
References:
1. http://www.cisco.com/en/US/docs/wireless/controller/7.0/command/reference/cli7
0commands.html#wp4999879
Page 37
1.16 Ensure 'Control Path Rate Limiting' is enabled (Automated)
Profile Applicability:
• Level 1
Description:
This control determines whether the switch control path rate limiting feature is enabled.
The recommended setting is enabled.
Rationale:
If the Wireless LAN Controller is not able to keep up with the volume of management
traffic it is receiving, a denial-of-service condition could occur. When control plane
policing is enabled this ensures that the CPU is not overwhelmed by management
traffic. The default state is enabled.
Audit:
Perform the following to determine if control plane policing is enabled or disabled.
1. Run the following command:
Remediation:
Enable control plane policing on the controller.
References:
1. http://www.cisco.com/en/US/docs/wireless/controller/7.0/command/reference/cli7
0commands.html#wp7209817
Page 38
2 Wireless Local Area Network (LAN) Configurations
This section prescribes controls to secure Wireless Local Area Networks (LAN).
Page 39
2.1 Ensure 'Broadcast SSID' is disabled (Automated)
Profile Applicability:
• Level 1
Description:
This control determines if the Wireless Local Area Networks (WLANs) Service Set
Identifier (SSID) is broadcast. The recommended setting is disabled.
Rationale:
Though it doesn't prevent an attacker from detecting the network, disabling broadcast
Service Set Identifiers (SSIDs) will prevent casual users from seeing it on client side
network lists. Disabling broadcast SSID will also make the identification of wireless
networks more difficult.
Audit:
To validate that broadcast SSIDs are disabled,
1. Run the following command;
Remediation:
1. Determine the WLANs to which the change will be made:
References:
1. http://www.cisco.com/en/US/docs/wireless/controller/7.0/command/reference/cli7
0commands.html#wp8366770
Page 40
2.2 Ensure 'WPA2-Enterprise' is Enabled for configured 'Wireless
LAN identifiers' (Automated)
Profile Applicability:
• Level 1
Description:
This control determines if configured Wireless Local Area Networks (WLANs) are
configured to use Wi-Fi Protected Access 2 (WPA2) security protocol. The
recommended setting is to enable WPA2 and 802.1x for configured Wireless LAN
identifiers (WLAN IDs).
Rationale:
Alternative encryption and authentication methods for connecting wireless clients to the
wireless network have drawbacks. WEP has been proven ineffective and methods using
pre-shared keys could be defeated by rainbow tables. 802.11i provides authenticated
access using 802.1x and EAPoL and encryption using AES-based encryption.
Audit:
1. Run the following command to display a list of WLAN IDs managed by the device:
Remediation:
Run the following command for each WLAN ID when WPA2 is not enabled.
References:
1. http://www.cisco.com/en/US/docs/wireless/controller/7.0/command/reference/cli7
0commands.html#wp4891599
Page 41
Additional Information:
PCI DSS §2.1.1 §4.2
PCI DSS Wireless Guidelines - Section 4.4 - Strong Wireless Authentication and
Encryption
PCI DSS Requirement - Section 4.1.1 - Ensure wireless networks transmitting
cardholder data or connected to the cardholder data environment, use industry best
practices (for example, IEEE 802.11i) to implement strong encryption for authentication
and transmission. Note: The use of WEP as a security control was prohibited as of 30
June 2010.
Page 42
2.3 Ensure 'Peer-to-Peer Blocking Action' is set to 'Drop' for All
'Wireless LAN Identifiers' (Automated)
Profile Applicability:
• Level 1
Description:
This control determines whether the Wireless LAN Controller is configured to prevent
clients connected to the same Wireless Local Area Controller from communicating with
each other.
Rationale:
Wireless Client Isolation prevents wireless clients from communicating with each other
over the RF. Packets that arrive on the wireless interface are forwarded only out the
wired interface of an Access Point. One wireless client could potentially compromise
another client sharing the same wireless network.
Audit:
1. Determine which WLANs will be audited:
Remediation:
1. Determine which WLANs will be changed:
Page 43
(Cisco Controller) ><strong>config wlan peer-blocking drop</strong> <WLAN
ID>
References:
1. http://www.cisco.com/en/US/docs/wireless/controller/7.0/command/reference/cli7
0commands.html#wp10562677
Additional Information:
PCI DSS §4.1.1 §4.4
Page 44
Appendix: Summary Table
CIS Benchmark Recommendation Set
Correctly
Yes No
Page 45
CIS Benchmark Recommendation Set
Correctly
Yes No
Page 46
Appendix: Change History
Date Version Changes for this version
Page 47