07-25-2022 05:52 AM
Hello
I have WLC AIR-AP1815I-I-K9 , the authentication WPA2Personal+ Mac-filter
and created the VLAN of WiFi users on Firewall & passing to FMC 6.4.0.4,
I found some users sharing the internet by hotspot from laptops & Mobiles,
does there any solution to prevent that?
Thank in advance.
07-25-2022 04:25 PM
@W-ALI wrote:
I found some users sharing the internet by hotspot from laptops & Mobiles,
Depends on what country you are in.
But legally, no. You cannot.
07-25-2022 10:12 PM
thanks @Leo Laohoo for your reply
our company policy prevent any employ to sharing any DATA with unauthorized user or device and all employees signed for that , because that's illegally to use company resource without approval, even the internet by hotspot, that's effect to company internet performance & security network.
07-25-2022 10:23 PM - edited 07-25-2022 10:25 PM
@W-ALI wrote:
because that's illegally to use company resource without approval, even the internet by hotspot, that's effect to company internet performance & security network.
Make sure internet access is not allowed. Across the board.
Make sure the glass windows are "low-e". This will block anything wireless.
07-25-2022 10:34 PM
the WIFI users must access the internet , I can't deny that, his works depended on internet.
already there's Domain policy to disable the Hotspot option for laptops which joined domain, but we can't find any solution for mobile.
07-25-2022 10:52 PM
@W-ALI wrote:
the WIFI users must access the internet , I can't deny that, his works depended on internet.
Well, this contradicts company policy then.
07-26-2022 12:03 AM
unknown device or unauthorized user who use WiFi this contradicts company policy
07-26-2022 12:57 AM
@W-ALI wrote:
unknown device or unauthorized user who use WiFi
Well, no. That is not correct.
If a person logs into the corporate SSID, that person is authorized to use the WiFi.
If a person signs up for free WiFi, then that person is authorized to use the WiFi.
The thing is, if the company really wants to "police" the policy, then WiFi is not the answer. A firewall and proxy server is the answer.
07-26-2022 01:12 AM
that's correct @Leo Laohoo
but what happened, the person logs into the corporate SSID, that person is authorized to use the WiFi , but he share the internet by hotspot to his coworker who not authorized to use WIFI.
07-26-2022 01:27 AM
@W-ALI wrote:
but he share the internet by hotspot to his coworker who not authorized to use WIFI.
That is good.
This only proves the problem is not a technology issue but a policy issue.
This has been demonstrated over and over again when users want something and management refuses. They either do something like this or similar, like bringing hubs into the corporate network.
07-26-2022 06:47 AM
Like Leo said you can potentially solve this problem by allowing internet access via proxy only from authorised devices only.
But ultimately this is bad policy and design. Just provide an open guest SSID for users to connect their own devices to, otherwise they will just keep circumventing your controls as you've discovered and as fast as you close loopholes they'll find new ones.
And if you're still insisting on trying to control your users then it is possible to use MDM to apply policies to practically any device but users probably won't allow you to control their personal devices so that's unlikely to help you much.
Just move into the 21st century and let your users access WiFi - needs a rethink on policy by senior management who often try to apply 20 year old policies in an age where everyone expects to have WiFi/internet all the time.
That will ultimately save you time and effort and make your corporate network more secure because personal devices will be separated. All you need is an "acceptable use policy" with content filtering to ensure no blatant misuse for unacceptable content but content filtering can be circumvented too so that should then be dealt with by HR based on the AUP.
07-26-2022 08:16 AM
Thanks @Rich R for your input,
I agree with you , but the situation different from company to company depend on policy & work environment ,especially when that related with high confidential DATA & work with +1300 employees ,
by default must block anything and permit just needed , that's recommended by security audit and we are forced to do it In order for the company to obtain quality certificates for network & security.
thanks again for your input I appreciate that
07-26-2022 11:48 AM - edited 07-26-2022 11:50 AM
>especially when that related with high confidential DATA
It sounds to me like you don't have the appropriate tools and processes in place to be safe.
If you are worried about protecting highly confidential data then you should (at a minimum) have a DLP solution in place. Specifically, if you are in a Microsoft world, you should be looking at Information Rights management. This allows you to control specifically who can access data, and it does not matter where that person is located. If an employee emailed/sent IRM protected data to an outside party - that party could not use the data. If you had an information disclosure, you can withdraw access to that data.
Currently, what is your plan if some of this data is breached (and it will be breached, it is just a matter of when)?
Secondly, you need to look at ways to limit access to core apps (such as Office 365) to corporate-owned (or approved devices only). You can do this using Azure AD Premium P1 (or better) and Intune, or my preference, Cisco Duo (using the beyond plan) and a trusted device policy. This also allows the system to prevent access to sensitive systems from a compromised device. And it specifically allows you to say systems can only be accessed from an approved device (so an outside party would not be able to access your systems, even with a user's username and password).
https://duo.com/docs/trusted-endpoints
What currently is your plan to prevent access to your data from untrusted or compromised devices?
You should also be using "label" management to classify data. Then you can create rules to say things like "highly sensitive" data may never leave your network. "Sensitive" data may only leave with a managers approval. Etc. You decide your own requirements and rules.
https://docs.microsoft.com/en-us/microsoft-365/compliance/sensitivity-labels?view=o365-worldwide
You can Google "Zero Trust" if you want to learn more about these general concepts.
At least this is what I do with my clients to keep them safe. Once you have appropriate controls, systems and tools in place - Internet access isn't such a threat. You aren't having to 100% rely on your perimeter as your ownly line of defence - it's just a layer of protection in a multi-facet approach to data security.
07-26-2022 01:14 PM
Million thanks @Philip D'Ath for your post, really it's amazing and It contains very important and wonderful tips,
I agree totally with you,
as you know , there is a specific financial budget for the IT department and should not exceed it,
The highest protection must be provided at the lowest cost,This is the management policy in most companies.
The IT administrator always tries to provide highest service and protection with lowest cost to obtains the satisfaction of the management.
technically, already There's security policy with high restrict for the PCs applied by Microsoft Domain & Cisco Devices plus high system for monitor tools,
however ,as you know, there is no final limit to security, no 100% security ,
We just try to do the best we can with the possibilities available.
Thank you so much to you and all the geniuses in this wonderful community
all of them an important source of information for us to learn more.
07-27-2022 11:32 PM
For Windows laptops you can create a policy to disable sharing connection (https://www.tenforums.com/tutorials/106796-enable-disable-mobile-hotspot-windows-10-a.html). Unfortunately for mobile devices the only option is to use a MDM solution.
In parallel, you can also disable connection to unknown networks using GPO, so you can whitelist the only SSIDs that are safe to use, but this option limits teleworking.
HTH
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide