I'm thinking of two scenarios. In the first (reactive), the WIPS detects a rogue device and then starts sending out "jamming" traffic so it renders the rogue point useless until you have the opportunity to physically track down the device and disable it.
In the second (proactive), you send a "jamming signal" on all unused frequencies within the area so that a rogue point can't get a signal out.
Eek! Steve, you get into scary territory when you talk about jamming traffic and blocking devices that run in Wi-Fi's unlicensed spectrum. Technically, unlicensed airwaves belong to everyone.
Because of the "open" nature of these particular airwaves, the WIPS role and goal, then, would be to disable unauthorized devices that are not just in your airspace but are also trying to connect to or have already connected to your network - an illegitimate activity. But there are other devices in your airspace that might be legitimate devices on someone else's network (like the office above you in a multitenant building), but are unauthorized on yours.
That said, your question brings up a really good topic for discussion: How the WIPS vendors delicately balance the degree of automation they include in their systems with the need to be careful about who they automatically cut off. Automation is very desirable in terms of reducing operational complexity and nipping security issues in the bud. But overzealous automation could get the Wi-Fi network operator (the enterprise) in trouble by snuffing out someone else's right to use the airwaves.
WIPS vendors: How do you balance these considerations? Any tips/advice for how enterprises should automate their settings?
Good question Steve and Joanie. Unless a WIPS system can do accurate device classification, it is not recommended to automate prevention. This means the ability to detect accurately ON/OFF wire for devices you are seeing over the air. WIPS system needs to be able to possitively identify between a rogue AP connected to the enterprise wired network versus neighbor APs. Common mistake is to classify all unknown APs as rogue APs.
AirTight uses robust ON/OFF wire detection for all devices seen over the air using multiple techniques including our marker packet technology executed on our sensors. Our Sensors are able to positively identify if a device is connected to customer’s wired network. If so, Server determines if the device is rogue or not based on customer's policy definition. This is a good scenario where prevention can be automated because of our accurate classification techniques. Same goes for other threats such as authorized client misassociating to neighbor AP or adhoc connectivity between two authorized clients.
Cases where you do not want to automate prevention. A newly detected AP that hasn't been classified yet. i.e. If it is in Uncategorized status then prevention should not be enabled for this. Same goes for uncategorized clients as well. Lastly, customers should analyze which specific threats they want to automatic prevention based on their environment.