• Around The HomeToggle Menu

    • Entertainment
    • Productivity
    • Smart Home
  • FamilyToggle Menu

    • Parenting
    • Toys
    • Pets
    • Travel
  • ReviewsToggle Menu

    • Phones
    • Tablets
    • Laptops
    • Desktops
    • Wearables
    • Audio
    • Cameras
    • Headphones
    • Printers
    • Smart Home
    • TVs
    • Gaming and Video
  • One Cool ThingToggle Menu

    • Frugal Tech
    • Kickstarters
    • Videos
  1. Home
  2. Around The Home
  3. Productivity
  4. What Is AP Isolation?

What Is AP Isolation?

By: David Dunning | September 19, 2018
  • Share
  • Share on Facebook

In computer networking, AP is an abbreviation for access point. An access point, or wireless access point, is a device that permits mobile devices, such as laptop computers and personal digital assistants, to connect wirelessly to a wired computer network. AP isolation is a technique for preventing mobile devices connected to an AP from communicating directly with each other.

Aerial View of City Network of Beijing Skyline
credit: Wenjie Dong/E+/GettyImages

Malicious Network Traffic

AP isolation effectively creates a "virtual" network among wireless devices, one in which each device is a separate entity in its own right. AP isolation allows network administrators to separate potentially malicious network traffic from a publicly accessible portion of a wireless network from the main control network. In so doing, it prevents the main control network from being flooded with unsolicited network traffic, which may include viruses, worms and Trojan horses.

AP Isolation Applications

A typical application of AP isolation is a wireless hotspot, of the type found in airports, coffee bars and railway stations. A wireless hotspot typically allows numerous guest users to connect to an AP and create a single, large wireless network. Without AP isolation, unscrupulous users could connect to network devices other than the AP itself for the purposes of hacking or flood the whole network with traffic, rendering it unusable.

Video of the Day

ARP Poisoning

AP isolation can be a useful weapon in the fight against malicious attacks on wireless networks, but certain types of attack, known as ARP poisoning or ARP spoofing attacks, may be able to bypass the AP altogether. ARP stands for Address Resolution Protocol and describes a method of finding the physical Ethernet address of a network device from its Internet Protocol address. An attacker may transmit a unit of data, known as a packet, with a falsified Ethernet address directly to a network device so that it appears that the packet came from the AP. To protect against this type of attack, network administrators must place wired Ethernet devices on a different portion of the network, or subnet, than wireless devices.

Publicly Secure Packet Forwarding (PSPF)

Almost all network equipment vendors implement AP isolation in one form or another. One of the world's leading network vendors, Cisco, implements AP isolation in the form of a technology known as Publicly Secure Packet Forwarding. However, PSPF, in common with other AP isolation techniques, does not prevent an attacker from sending a "poisoned" ARP packet to another client, so it must still be used in conjunction with subnetting to provide an effective defense mechanism.

Show Comments

Related Articles

Advantage and Disadvantage of MAC Address Filtering

Advantage and Disadvantage of MAC Address Filtering

Around The Home
Productivity
By: Ruri Ranbe
What Is a Perimeter Firewall?

What Is a Perimeter Firewall?

Around The Home
Productivity
By: David Dunning
Purpose of the IP Protocol

Purpose of the IP Protocol

Around The Home
Productivity
By: Saifuddin Abdullah
What Does Gateway Ping Mean?

What Does Gateway Ping Mean?

Around The Home
Productivity
By: Meg North
How to Find the IP Address of the Firewall on My Network

How to Find the IP Address of the Firewall on My Network

Around The Home
Productivity
By: Joe Teagno
What Are the Functions of a Network Bridge?

What Are the Functions of a Network Bridge?

Around The Home
Productivity
By: Stephen Byron Cooper
  • HOW WE SCORE
  • ABOUT US
  • CONTACT US
  • TERMS
  • PRIVACY POLICY
  • COPYRIGHT POLICY
  • Advertise

An error occurred. Try again later.

Thanks for signing up!
© 2019 Leaf Group Ltd. Leaf Group Media

Get great tech advice delivered to your inbox.

Keep your family productive, connected, entertained, and safe.

Please enter a valid email.