3 mu intrusion detection, 1 configuring mu intrusion detection, 3 mu intrusion detection -9 – Motorola Series Switch WS5100 User Manual
Page 233: 1 configuring mu intrusion detection -9, Mu intrusion detection, Information, see
Switch Security
6-9
3. The
Unapproved APs (Reported by MUs)
table displays the following information:
4. The
Number of Unapproved APs
is simply the sum of all of Unapproved Radio MAC Addresses
detected.
5. Click the
Export
button to export the contents of the table to a Comma Separated Values file (CSV).
6.3 MU Intrusion Detection
Unauthorized attempts to access the switch managed LAN by MUs is a significant threat to the network. The
switch can protect against threats from MUs trying to find network vulnerabilities. Basic forms of this
behavior can be monitored and reported.
Use the
Mobile Unit Intrusion Detection
sub-menu to view and configure MU intrusion related
information. The Mobile Unit Intrusion Detection screen consists of the following tabs:
•
Configuring MU Intrusion Detection
•
6.3.1 Configuring MU Intrusion Detection
To configure MU intrusion detection:
1. Select
Security
>
Mobile Unit Intrusion Detection
from the main tree menu.
BSS MAC Address
Displays the MAC Address of each Unapproved AP. These MAC Addresses are access points
observed on the network (by associated MUs), but have yet to be added to the list of
Approved APs, and are therefore interpreted as a threat on the network.
Reporting MU
Displays the numerical value for the detecting MU.
Last Seen (In
Seconds)
Displays the time (in seconds) the Unapproved AP was last seen on the network by the
detecting MU. Use this interval to determine whether the detected MU is still a viable threat.
ESSID
Displays the ESSID of each Unapproved AP. These ESSIDs are device ESSIDs observed on the
network, but have yet to be added to the list of Approved APs and are therefore interpreted
as a threat.