<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Authentication and Association flood attack. in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/authentication-and-association-flood-attack/m-p/5283653#M282660</link>
    <description>&lt;P&gt;Yeah, I understand how Client Exclusion works, it's an effective tool for preventing the same client from repeatedly failing authentication or association attempts. I'm also exploring additional ideas to mitigate a DDoS attack scenario based on the C9800 aWIPS signature, particularly authentication and association floods. If anyone has implemented a wireless network with a strong focus on security or DDoS attack prevention, I would appreciate their insights and experiences.&lt;/P&gt;&lt;P&gt;From what I've found online, both the showcase and official Cisco documents on Cisco wireless security offer minimal breakdown of aWIPS technical details.&lt;/P&gt;</description>
    <pubDate>Tue, 22 Apr 2025 06:59:59 GMT</pubDate>
    <dc:creator>bakaholic39</dc:creator>
    <dc:date>2025-04-22T06:59:59Z</dc:date>
    <item>
      <title>Authentication and Association flood attack.</title>
      <link>https://community.cisco.com/t5/wireless/authentication-and-association-flood-attack/m-p/5283433#M282644</link>
      <description>&lt;P&gt;Hi all!&lt;BR /&gt;&lt;BR /&gt;I just want to know is there a way to configure rate limit for authentication and association request to prevent the flood attack, either on AireOS and IOS-XE WLC.&lt;/P&gt;&lt;P&gt;As in my understanding, this type of attack aims to AP's association table if this table reached to the limit this may cause the AP resource outage.&lt;/P&gt;&lt;P&gt;Since the Cisco aWIPS solution only for "detecting" the anomalies. (I'm not get it why does it called wireless intrusion prevention)&lt;/P&gt;</description>
      <pubDate>Mon, 21 Apr 2025 15:56:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/authentication-and-association-flood-attack/m-p/5283433#M282644</guid>
      <dc:creator>bakaholic39</dc:creator>
      <dc:date>2025-04-21T15:56:27Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication and Association flood attack.</title>
      <link>https://community.cisco.com/t5/wireless/authentication-and-association-flood-attack/m-p/5283446#M282646</link>
      <description>&lt;P&gt;It's not about attacking APs association table, it's more like a disruption to the existing wireless network by sending something which is not legitimate. Important to note that you need DNAC for aWIPS to work correctly. Please refer -&amp;nbsp;&lt;BR /&gt;1.&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/td/docs/wireless/controller/9800/17-12/config-guide/b_wl_17_12_cg/m_awips.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/wireless/controller/9800/17-12/config-guide/b_wl_17_12_cg/m_awips.html&lt;/A&gt;&lt;BR /&gt;2.&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/td/docs/cloud-systems-management/network-automation-and-management/catalyst-center-rogue-management-application/2-3-7/quick-start-guide/b_rogue_management_qsg_2_3_7/rogue_management_chapter_01.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/cloud-systems-management/network-automation-and-management/catalyst-center-rogue-management-application/2-3-7/quick-start-guide/b_rogue_management_qsg_2_3_7/rogue_management_chapter_01.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 21 Apr 2025 16:47:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/authentication-and-association-flood-attack/m-p/5283446#M282646</guid>
      <dc:creator>Saikat Nandy</dc:creator>
      <dc:date>2025-04-21T16:47:14Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication and Association flood attack.</title>
      <link>https://community.cisco.com/t5/wireless/authentication-and-association-flood-attack/m-p/5283452#M282647</link>
      <description>&lt;P&gt;Hi Saikat,&lt;/P&gt;&lt;P&gt;Thanks for reply. Yes, I have DNAC integrated with 9800 WLC, and refer to the 2nd doc you provided, it's mentioned about&amp;nbsp;&lt;SPAN&gt;Authentication flood is attacking&amp;nbsp;to AP's&amp;nbsp;association table.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 21 Apr 2025 17:02:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/authentication-and-association-flood-attack/m-p/5283452#M282647</guid>
      <dc:creator>bakaholic39</dc:creator>
      <dc:date>2025-04-21T17:02:49Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication and Association flood attack.</title>
      <link>https://community.cisco.com/t5/wireless/authentication-and-association-flood-attack/m-p/5283458#M282648</link>
      <description>&lt;P&gt;True..the interpretation is important here (how easily it can be understandable) and that's why said '&lt;SPAN&gt;disruption to the existing wireless network by sending something which is not legitimate.&lt;/SPAN&gt;'&lt;/P&gt;</description>
      <pubDate>Mon, 21 Apr 2025 17:18:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/authentication-and-association-flood-attack/m-p/5283458#M282648</guid>
      <dc:creator>Saikat Nandy</dc:creator>
      <dc:date>2025-04-21T17:18:24Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication and Association flood attack.</title>
      <link>https://community.cisco.com/t5/wireless/authentication-and-association-flood-attack/m-p/5283460#M282649</link>
      <description>&lt;P&gt;Sure, the impact is disruptive to the wireless network, but I'm looking for a way to prevent it. If this flood is being sent by a single source device, and excluded clients feature may help mitigate it. However, if the attack comes from multiple source devices, how can I prevent it? Is there a way to configure rate limiting to ignore requests that exceed a threshold within a short period of time?&lt;/P&gt;</description>
      <pubDate>Mon, 21 Apr 2025 17:41:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/authentication-and-association-flood-attack/m-p/5283460#M282649</guid>
      <dc:creator>bakaholic39</dc:creator>
      <dc:date>2025-04-21T17:41:39Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication and Association flood attack.</title>
      <link>https://community.cisco.com/t5/wireless/authentication-and-association-flood-attack/m-p/5283517#M282653</link>
      <description>&lt;P&gt;I'd use&amp;nbsp;&lt;SPAN&gt;Client Exclusion Timeout to offset this.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 21 Apr 2025 23:02:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/authentication-and-association-flood-attack/m-p/5283517#M282653</guid>
      <dc:creator>Leo Laohoo</dc:creator>
      <dc:date>2025-04-21T23:02:07Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication and Association flood attack.</title>
      <link>https://community.cisco.com/t5/wireless/authentication-and-association-flood-attack/m-p/5283626#M282655</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Yep, I agree with that. However, Client Exclusion may has its limitations if a device experiences five consecutive 802.11 association failures, it will be marked as &lt;STRONG&gt;Excluded&lt;/STRONG&gt;. Does this mean the WLC utilizes CPU resources to classify these failures&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;In a scenario where an attacker generates a large number of fake client and send auth or assoc req to the WLC, even the Client Exclusion mechanism could lead to excessive resource consumption. Therefore, it may be more effective if there is something on the control plane-level that automatically ignores certain types of requests when flooding occurs within a short period&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Apr 2025 06:07:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/authentication-and-association-flood-attack/m-p/5283626#M282655</guid>
      <dc:creator>bakaholic39</dc:creator>
      <dc:date>2025-04-22T06:07:40Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication and Association flood attack.</title>
      <link>https://community.cisco.com/t5/wireless/authentication-and-association-flood-attack/m-p/5283631#M282657</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1547404"&gt;@bakaholic39&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;SPAN&gt;Does this mean the WLC utilizes CPU resources to classify these failures&lt;/SPAN&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Compared to a wireless client hammering the WLC with incorrect password?&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Depending on the network, if Client Exclusion is set to a good number, it is a good tool.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For example, in a hospital.&amp;nbsp; We all know that medical wireless client like static credentials entered manually.&amp;nbsp; We set our Client Exclusion to 300 seconds.&amp;nbsp; If we set exclusion to &amp;lt;60 seconds, the failed client authentication can hammer our 9800-80 to it's knees.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Apr 2025 06:26:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/authentication-and-association-flood-attack/m-p/5283631#M282657</guid>
      <dc:creator>Leo Laohoo</dc:creator>
      <dc:date>2025-04-22T06:26:26Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication and Association flood attack.</title>
      <link>https://community.cisco.com/t5/wireless/authentication-and-association-flood-attack/m-p/5283650#M282659</link>
      <description>&lt;P&gt;Authentication and Association floods happen by sending to the AP lots of auth and association packets, during initial negotiation of the wireless connection, way before dot1X happen, so Client Exclussion or any other feature in the AAA service won't be able to stop these attacks.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Apr 2025 06:58:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/authentication-and-association-flood-attack/m-p/5283650#M282659</guid>
      <dc:creator>JPavonM</dc:creator>
      <dc:date>2025-04-22T06:58:47Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication and Association flood attack.</title>
      <link>https://community.cisco.com/t5/wireless/authentication-and-association-flood-attack/m-p/5283653#M282660</link>
      <description>&lt;P&gt;Yeah, I understand how Client Exclusion works, it's an effective tool for preventing the same client from repeatedly failing authentication or association attempts. I'm also exploring additional ideas to mitigate a DDoS attack scenario based on the C9800 aWIPS signature, particularly authentication and association floods. If anyone has implemented a wireless network with a strong focus on security or DDoS attack prevention, I would appreciate their insights and experiences.&lt;/P&gt;&lt;P&gt;From what I've found online, both the showcase and official Cisco documents on Cisco wireless security offer minimal breakdown of aWIPS technical details.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Apr 2025 06:59:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/authentication-and-association-flood-attack/m-p/5283653#M282660</guid>
      <dc:creator>bakaholic39</dc:creator>
      <dc:date>2025-04-22T06:59:59Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication and Association flood attack.</title>
      <link>https://community.cisco.com/t5/wireless/authentication-and-association-flood-attack/m-p/5283658#M282662</link>
      <description>&lt;P&gt;Thanks for sharing, I see the &lt;SPAN&gt;Client Exclusion condition in the doc:&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/td/docs/wireless/controller/9800/technical-reference/c9800-best-practices.html#Clientexclusion" target="_blank"&gt;Cisco Catalyst 9800 Series Configuration Best Practices - Cisco&lt;/A&gt;&lt;BR /&gt;Would it be correct to say that Client Exclusion may not be effective against an authentication flood, but could help mitigate an association flood by triggering the condition of '&lt;EM&gt;Five consecutive 802.11 association failures&lt;/EM&gt;'?&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Apr 2025 07:06:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/authentication-and-association-flood-attack/m-p/5283658#M282662</guid>
      <dc:creator>bakaholic39</dc:creator>
      <dc:date>2025-04-22T07:06:59Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication and Association flood attack.</title>
      <link>https://community.cisco.com/t5/wireless/authentication-and-association-flood-attack/m-p/5283679#M282663</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1547404"&gt;@bakaholic39&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;SPAN&gt;If anyone has implemented a wireless network with a strong focus on security or DDoS attack prevention, I would appreciate their insights and experiences.&lt;/SPAN&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;That will depend on how the SSID is configured, how heavily "loaded" the WLC, etc.&lt;/P&gt;
&lt;P&gt;For instance, it is highly recommended to use PSK and not use any outside authentication servers.&amp;nbsp; The reason behind this is because the communication channels between the controller and the authentication server can get overwhelmed if the Client Exclusion is nonexistence or is set at a lower rate.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Next, the 9800-40/-80 cannot cope if the authentication is not open or PSK.&amp;nbsp; I can attest to this claim because the OS is buggy and almost anything can trigger a catastrophic memory leak.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Combine that with a 9800-40/-80/M/H1/H2 with AP scale of &amp;gt;51% and a daily wireless client count of &amp;gt;10k and it will not take long before the controller's memory utilization will hit catastrophic level in weeks.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Apr 2025 08:32:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/authentication-and-association-flood-attack/m-p/5283679#M282663</guid>
      <dc:creator>Leo Laohoo</dc:creator>
      <dc:date>2025-04-22T08:32:45Z</dc:date>
    </item>
  </channel>
</rss>

