cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
3699
Views
65
Helpful
15
Replies

How to prevent WIFI users from using hotspot

W-ALI
Level 1
Level 1

Hello

I have WLC AIR-AP1815I-I-K9 , the  authentication  WPA2Personal+ Mac-filter

and created the VLAN of WiFi users  on Firewall & passing to FMC 6.4.0.4,

I found some users sharing the internet by  hotspot from laptops & Mobiles,

does there any solution to prevent that?

Thank in advance.

15 Replies 15

Leo Laohoo
Hall of Fame
Hall of Fame

@W-ALI wrote:

I found some users sharing the internet by  hotspot from laptops & Mobiles,


Depends on what country you are in.  

But legally, no.  You cannot.  

Marriott Fined $600,000 For Jamming Guest Hotspots

thanks @Leo Laohoo for your reply

our company policy prevent any employ  to sharing any DATA with unauthorized user or device and all employees signed for that , because that's illegally to use company resource without approval, even the internet by hotspot, that's effect to company internet performance & security network.


@W-ALI wrote:

because that's illegally to use company resource without approval, even the internet by hotspot, that's effect to company internet performance & security network.


Make sure internet access is not allowed.  Across the board.  

Make sure the glass windows are "low-e".  This will block anything wireless.

 

@Leo Laohoo 

the WIFI users must access the internet , I can't deny that, his works depended on internet.

already there's Domain policy to disable the Hotspot option for laptops which joined domain,   but we can't find any solution for mobile.


@W-ALI wrote:

the WIFI users must access the internet , I can't deny that, his works depended on internet.


Well, this contradicts company policy then.  

@Leo Laohoo 

unknown device or unauthorized user  who use WiFi  this contradicts company policy


@W-ALI wrote:

unknown device or unauthorized user  who use WiFi 


Well, no.  That is not correct. 

If a person logs into the corporate SSID, that person is authorized to use the WiFi.

If a person signs up for free WiFi, then that person is authorized to use the WiFi.

The thing is, if the company really wants to "police" the policy, then WiFi is not the answer.  A firewall and proxy server is the answer.

 

that's correct  @Leo Laohoo 

but what happened, the person logs into the corporate SSID, that person is authorized to use the WiFi , but he share the internet by hotspot  to his coworker who not authorized to use WIFI.


@W-ALI wrote:

but he share the internet by hotspot  to his coworker who not authorized to use WIFI.


That is good.  

This only proves the problem is not a technology issue but a policy issue.  

This has been demonstrated over and over again when users want something and management refuses.  They either do something like this or similar, like bringing hubs into the corporate network.

Rich R
VIP
VIP

Like Leo said you can potentially solve this problem by allowing internet access via proxy only from authorised devices only.
But ultimately this is bad policy and design.  Just provide an open guest SSID for users to connect their own devices to, otherwise they will just keep circumventing your controls as you've discovered and as fast as you close loopholes they'll find new ones.
And if you're still insisting on trying to control your users then it is possible to use MDM to apply policies to practically any device but users probably won't allow you to control their personal devices so that's unlikely to help you much.
Just move into the 21st century and let your users access WiFi - needs a rethink on policy by senior management who often try to apply 20 year old policies in an age where everyone expects to have WiFi/internet all the time.
That will ultimately save you time and effort and make your corporate network more secure because personal devices will be separated.  All you need is an "acceptable use policy" with content filtering to ensure no blatant misuse for unacceptable content but content filtering can be circumvented too so that should then be dealt with by HR based on the AUP.

Thanks @Rich R for your input,

I agree with you , but the situation different from company to company depend on policy & work environment ,especially when that related with high confidential DATA & work with +1300 employees  ,

by default must block anything  and permit just needed , that's recommended by security audit  and we are forced to do it In order for the company to obtain quality certificates for network & security.

thanks again for your input I appreciate that

 

 

 

>especially when that related with high confidential DATA 

It sounds to me like you don't have the appropriate tools and processes in place to be safe.

If you are worried about protecting highly confidential data then you should (at a minimum) have a DLP solution in place.  Specifically, if you are in a Microsoft world, you should be looking at Information Rights management.  This allows you to control specifically who can access data, and it does not matter where that person is located.  If an employee emailed/sent IRM protected data to an outside party - that party could not use the data.  If you had an information disclosure, you can withdraw access to that data.

https://support.microsoft.com/en-us/office/open-a-file-that-has-restricted-permissions-c7a70797-6b1e-493f-acf7-92a39b85e30c#:~:text=Information%20Rights%20Management%20(IRM)%20helps,authenticated%20by%20an%20IRM%20server. 

Currently, what is your plan if some of this data is breached (and it will be breached, it is just a matter of when)?

Secondly, you need to look at ways to limit access to core apps (such as Office 365) to corporate-owned (or approved devices only).  You can do this using Azure AD Premium P1 (or better) and Intune, or my preference, Cisco Duo (using the beyond plan) and a trusted device policy.  This also allows the system to prevent access to sensitive systems from a compromised device.  And it specifically allows you to say systems can only be accessed from an approved device (so an outside party would not be able to access your systems, even with a user's username and password).
https://duo.com/docs/trusted-endpoints 

What currently is your plan to prevent access to your data from untrusted or compromised devices?

You should also be using "label" management to classify data.  Then you can create rules to say things like "highly sensitive" data may never leave your network.  "Sensitive" data may only leave with a managers approval.  Etc.  You decide your own requirements and rules.
https://docs.microsoft.com/en-us/microsoft-365/compliance/sensitivity-labels?view=o365-worldwide 

You can Google "Zero Trust" if you want to learn more about these general concepts.

At least this is what I do with my clients to keep them safe.  Once you have appropriate controls, systems and tools in place - Internet access isn't such a threat.  You aren't having to 100% rely on your perimeter as your ownly line of defence - it's just a layer of protection in a multi-facet approach to data security.

Million thanks @Philip D'Ath  for your post, really it's amazing and It contains very important and wonderful tips,
I agree totally with you,

as you know , there is a specific financial budget for the IT department and should not exceed it,
The highest protection must be provided at the lowest cost,This is the management policy in most companies.
The IT administrator always tries to provide highest service and protection with lowest cost to obtains the satisfaction of the management.

technically, already There's security policy with high restrict for the PCs applied by Microsoft Domain & Cisco Devices plus high system for monitor tools,
however ,as you know, there is no final limit to security, no 100% security ,
We just try to do the best we can with the possibilities available.

Thank you so much to you and all the geniuses in this wonderful community
all of them an important source of information for us to learn more.

JPavonM
VIP
VIP

For Windows laptops you can create a policy to disable sharing connection (https://www.tenforums.com/tutorials/106796-enable-disable-mobile-hotspot-windows-10-a.html). Unfortunately for mobile devices the only option is to use a MDM solution.

In parallel, you can also disable connection to unknown networks using GPO, so you can whitelist the only SSIDs that are safe to use, but this option limits teleworking.

HTH

Review Cisco Networking for a $25 gift card