REVIEW: Mojo wireless intrusion prevention system

Mojo's wireless access points can ID and mitigate threats, trigger alerts

wifi signin
Thinkstock

Network managers don't need a primer on the threats that could befall their networks, from man-in-the-middle threats from rogue APs to the global ransomware epidemic. It's a bad situation that shows no signs of improving any time soon. It's not surprising, then, that Wireless Intrusion Prevention Systems are becoming increasingly popular.

WIPS are based on the very sound idea that if you truly want to keep intruders off your network, you'll need intelligence both in the Wi-Fi access point and in the cloud. That's one reason why vendors such as Aruba, Cisco, and Extreme (Air Defense) offer solutions that combine analysis of network data with a back-end thinking engine.

Another WIPS vendor is Mojo Networks (formerly known as Airtight) which recently released a cloud-based Wireless Intrusion Prevention System as a Service called Cognitive WiFi. That is the subject of this review.

(We also requested review units from Aruba, Cisco, and Extreme, but Mojo is the only vendor that came through.)

Mojo’s WIPS architecture combines APs that can also be wireless routers (with optional DHCP) connected to a cloud-based engine that is used to both activate the APs and manage them -- so you can configure them, monitor traffic, choose authentication methods, perform forensics, and so on.

Mojo offers all the basics you'd expect from a WIPS. Admins can manage multiple sites at once and receive alerts when certain conditions are met. They can collect data about authorized visitors and guests (including data that could potentially be used for marketing purposes). The same APs can host multiple SSIDs with different levels of authorization. Most importantly, Mojo's APs can identify potential hazards and mitigate them automatically or bring them to the administrator's attention.

Once they're configured, the APs can be disconnected from Mojo's cloud console and continue to do their jobs, but until they reconnect to the mothership you won't get the full benefit of the back-end data analysis.

Mojo Networks' Cognitive WiFi satisfied us as being multi-site ready, understanding attacks, and having very good sensing skills—all manageable from a single, if clunky UI/UX.

What is WIPS?

As the name implies, WIPS use policy and network controls to prevent bad guys from gaining access to network resources. When they detect something that looks like rogue hardware, they send an alert to an admin who can determine whether it's actually a threat and if so, isolate it before it causes too much damage.

That means WIPS need to fit into a wide range of environments and, ideally, require a minimum of site-specific configuration detail. Some WIPS have used a local appliance (or access to a network operating center) to monitor traffic and/or serve as a router/firewall/switch. But when you're faced with monitoring multiple sites, this can become tedious, expensive and time consuming. Performing threat analysis and AP provisioning in the cloud simplifies and automates this process.

One reason WIPS-managed networks are increasingly popular is they can leverage your existing infrastructure – you don't have to move to the latest access point technology or wait for your systems partners to upgrade their security and authentication systems. As an unaligned organization, Mojo connects to WIPS infrastructure from Cisco and Aruba/HPE (though we didn't test this). Thus WIPS is less about brand names and more about secured pathways.

While it's vital to detect and mitigate rogue attacks quickly, forensic analysis, regulatory compliance and other needs can be equally important. Mojo’s cloud console lets you do all of this more or less on a single screen, although not always as elegantly as we'd have liked.

WIPS Architecture under Mojo

MojoNetworks' WIPS WiFi coverage is composed of AP connectivity managed by a cloud-based dashboard organized into two categories: Services (configuration, forensics, WIPS configuration, administration) and Apps (Learn/gateway screens, application analysis, optional software and more).

mojo dashboard Tom Henderson/IDG

We deployed six APs, all adjacent to a college campus and a shopping center office building, in a downtown location. Each location we tested had APs deployed according to the usual “rules” for deploying IEEE 802.11ac access points. Above the site are two transmitters, a 250w FM radio station, and its 900Mhz transmitter link. To say the area was radiologically active is an understatement.

Each Mojo-provided AP contains three radios: Two radios service the 2.4 and 5Ghz WiFi bands, while the third radio watches the environment for traffic and abnormalities. The third radio is a key element in watching the radiological scenery, and therefore in intrusion prevention capability, given the wide number of stressful circumstances that the other two radios can find themselves under. One of Mojo’s staff called it their “third eye,” and it’s an uncommon but not entirely unique feature.

Our test APs connected to a network segment with fiber-based Internet access and optionally to VLANs with traffic paths to local desired hosts/locations. From there, the PoE-powered Mojo APs initially boot a software firmware load from Mojo’s site, with policies and network and authentication information designated by the site administrator. Each AP can support multiple SSIDs each with their own WLAN configuration and policies. Depending on authentication method, each can support differing methods pinned to each SSID, including a customizable walled garden. While each AP can be completely tailored, generic templated configurations will suit most organizations; we found the templates easily modified and pretty thorough.

The APs pass traffic to internal and Internet choices as administrative policies describe. The policies are constructed to mate handily with SSIDs, and we could choose between open Internet access, through walled garden access (via social media authentication or a splash page), or by comparatively stringent methods. Mojo also supports third-party SAML 2.0-based authentication, though we didn't test that.

The service worked across IEEE 802.11a,b,g,n+/- and ac WiFi services as expected. Mojo’s APs seem to be able to detect APs and clients/WiFi devices down to -96db, corroborated by a Netscout analyzer whose threshold of sensitivity as a test tool is only slightly better.

The Dashboard Console

You configure APs using Mojo’s cloud portal, aka the Dashboard. If an AP can reach Mojo’s cloud resources, it will pull the location's or specific AP's configuration and restart using those settings. It’s like a netboot/PxEboot for the endpoint AP, and this is how you'd initially provision them. This worked fine, but pushing down new configurations took longer than we expected – one of our only beefs.

The Dashboard’s sub-windows are administratively definable, and the monitoring components of the dashboard are divided into four tabs: Network, Access Points, Clients and WIPS. We suggest using a high-res monitor in high resolution to get the most of the information on a screen; it doesn’t work well with laptop geometries unless you have binoculars. Multi-monitor setups for broader installations will be a must.

mojo security scorecard Tom Henderson/IDG

The business end of the Dashboard is the Wireless Services Manager. It's the largest work area of administrative control in the Dashboard and where we spent most of our time.

From the monitoring section of the Dashboard, we could monitorManaged Devices (Managed Access Points), WiFi (APs, Radios, Clients and WLANs), Security (APs, Clients and Networks), Applications (Protocols, named applications like Facebook, Amazon, XMPP (Messaging), FTP, etc.).

We checked the Managed Devices, and the WiFI and WLAN configuration (more on that later). Then we looked at the Security Tab, which has interesting data, including a long list of what’s in the vicinity, radiologically speaking – classified by Authorized, Misconfigured, Rogue, External, and Found but Uncategorized.

We deployed six total APs in our test environment, which in turn found dozens of area APs in the adjacent college building, nearby office buildings, residences, shopping centers, even people walking down the street with phones or devices on free-association mode. Amusingly but not surprisingly, a number of insecure WiFi printers were also found on adjacent/nearby networks. On a typical day, more than 80 APs were located in the vicinity of the test site, numerous unsecure devices, up to several hundred clients, as well as people walking and driving by with devices that constantly hunt for APs to join by default.

The Security tab reveals the goods: known APs, rogue clients and APs, all in a green/red UI, with blue noting external but detected devices, and light green denoting guests. White reveals uncategorized devices, neither fish nor fowl – detected but awaiting categorization until the layout of the network has been described by an administrator.

mojo monitoring security Tom Henderson/IDG

You can map APs to a base drawing, which indicates where physical devices like clients are located within the geometry of the drawing. That means you can track a smartphone user in near-realtime as they walk through the radiological boundaries of the AP-covered areas, as well as locate a rogue device or the source of an attack.

Security relies upon identifying, normalizing and successfully authenticating network devices. You can choose from several authentication themes, including the never-recommended completely open AP, as well as WPA/WPA2, along with 802.1x authentication. (The latter requires a Radius server in the circuit; there is a plug-in, but it uses a pre-shared key and therefore might not be useful, according to Radius experts.) You can also use Google authentication, where a Google authentication proxy circuit is tenable in conjunction with the walled garden software offered by the APs. The walled garden gateway is highly customizable, although the garden HTML splash screen editor frustrated us.

WPA2 can use the IEEE 802.1a and 802.1q IKE protocols, whose authentication is also external to the Mojo Network components. Using IKE is non-trivial for some organizations and so WPA2 PreSharedKey/PSK is most commonly used. As mentioned, we did not test third-party security providers with MojoNetwork’s APs.

Events

The bad guys wind up listed in the Events tab. Should a rogue AP appear – and anyone with a smartphone can make a rogue AP accidentally by attempting to share their Internet connection – that device remains permanently on the possible rogue AP list.

False positives such as these make it trickier to perform intrusion prevention and forensic analysis by dirtying the lists unnecessarily. You have to individually acknowledge each event – there can be hundreds of them – and add a note to each. We found this tedious in the extreme. This strictness will appeal, however, to diligent organizations. Great for documentation, bureaucracy for others. You use the same log to record system and performance-related events.

Authentication and rogue classification is important, because Mojo’s infrastructure attempts to detect other APs on the backbone or enterprise network. If it can do that, it considers them non-hostile. But if the logic can’t detect an AP (often by Mac address, but we suspect there are more methods), then the potentially rogue AP is considered to be hostile, and man-in-the-middle attacks or other attacks could be taking place.

We tested rogue APs both through emulation as well as actual rogue APs, then connected a rogue to the network to see if Mojo's cloud logic could identify it as a rogue. It took less than a minute, but we would have preferred it happen instantly.

External APs can optionally be auto-classified as rogue, but are automatically qualified. Rogue APs and clients trigger alarms, sometimes noisily (lots of log entries), and Mojo supports syslog pipes to an organization’s syslog analyzer(s) for regulatory/compliance purposes. The physical location of the rogue or potential rogue can then be vectored on the location map. It could be as innocent as someone trying to configure their device or they could be looking to snarf user credentials or cause re-association blockages, a kind of Denial of Service/DoS attack. There are many variants of DoS attacks disambiguated in the Forensics section of the Mojo Dashboard. The noise is therefore necessary.

Monitoring and Forensics

Monitored APs render interesting information, including an event log, but also a very difficult-to-read rendering (dark red text on a black background) of congestion information encountered by clients of the specific AP. Also included are traffic profiles, including top application for the AP. Amusingly, Spotify topped the list of several APs in our live test environment.

mojo monitoring applications Tom Henderson/IDG

The information regarding the radios in the APs renders a configuration listing of how the radios are related to WiFi channels, but also about their worst-case client sensitivity (how radiologically close, similar to “bars”) measured as RSSI (in dbm). This indicates the weakest signal the AP radio had with a client.

As we used three SSIDs and six APs, we could track traffic per SSID and the type of authentication used. We also got saw how the clients spread over the SSID/WLAN AP radios. We caught an Amazon video lover this way. It was 9 p.m., and he or she was the sole person in the building.

1 2 Page 1
Page 1 of 2
The 10 most powerful companies in enterprise networking 2022