Is there anyway to reload the software on the APs
is it possible to do a mitm attack on the software and therefore rogue software gets loaded onto the AP?. Like if someone is on your network and doing mitm on your router injecting code into the software on the AP?. Are updates signed with certificate pinning etc?
TRUSTED PLATFORM MODULE (TPM) All Aruba Instant On access points have an installedTPM for secure storage of credentials, keys, and bootcodes. source
How does a TPM protect from rogue software getting loaded on an AP or if the AP gets exploited? Can we reload the firmware at all?
Yes, it does protect. If somebody tries to inject rogue firmware it just fails to load en returns to previous safe version.
No you can't manually reload firmware, it's all done trough AWS cloud. Read more at https://www.arubainstanton.com/techdocs/en/content/maintenance/mobile/firm-upgrd.htm?Highlight=update#
Am I please get an employee to chime in on this
1. if your router is hijacked and performing a mitm attack, what protection is in place that rogue software doesn't get injected when an update happens
2. a rogue person on the network, can they exploit the AP
@JohnJ The software has specific signatures and has no possibility to load rogue software, and even if they did try it would fail due to unrecognized signatures. There is no interface to get into the AP in a live network, the AP connects and exchanges information with our secure cloud. We also conduct regular audits to detect and correct any issues that may arise.
does the AP not have a web interface that displays some information?
does the AP11 also have a tpm to help with the above ?
no way to perform a MITM attack, or a local attack to the AP?
Clients concern is loading spyware/malware/virus to the AP