Description | This article describes what PMFs are and when to configure them. |
Scope | FortiAP. |
Solution |
WiFi management frames are used between APs and endpoints to find, join, and leave networks. These management frames include:
The process of a wireless client to find and join a wireless network requires that certain frames be accessible to any and all endpoints even if they have not joined the network. So encrypting data at this point would be useless. The unprotected management frames are the following:
802.11w is a standard that aims to protect management frames and control frames. Data frames (if working with an authentication SSID) should be already protected via the encryption used. Although this standard has been available and supported since 2009, it was not until recently that this standard was required for WPA3 authentication suite of security standards.
This protection is useful to prevent WiFi systems spoofing de-authentication packets to prevent a managed corporate endpoint from connecting to a Rogue AP.
PMF enables protections as follows:
Management frames protected by PMF include:
With PMF enabled, neither clients nor an AP will be able to send management packets as another entity, regardless of whether it is a legitimate use case from WIPS (Wireless Intrusion Prevention Systems) or a malicious attack.
It is important to note that PMF will not protect against Layer 1 denial of service attacks, like a wireless network jamming attack.
PMF on WPA3 and Transition Modes.
To enable PMF on VAP from FortiAP:
config wireless-controller vap edit "vap-name" set pmf disable next end
It is possible to identify whether an SSID has PMF enabled or not by looking into the Robust Security Network Information Element (RSN IE) on the beacon. See Technical Tip: Connectivity issue between FortiAP and Aruba UXI Sensor 'UX-G6C'/Printer is an Epson ....
PMF as a protocol provides more security, but still fails on some points. The following are key considerations to keep in mind:
Control frames are not protected, including CTS and RTS, which leaves the network unprotected against layer 2 Denial of Service attacks. The 4-way-handshake is not protected, meaning the wireless client is susceptible to man-in-the-middle attacks and evil twin attacks at first connection to the network. On WPA3 transition networks that support WPA2 and WPA3, PMF is not required and some clients will be vulnerable to attacks.
Other resources: Technical Tip: Connectivity issue between FortiAP and Aruba UXI Sensor 'UX-G6C'/Printer is an Epson .... |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.