Rockwell Automation 1783-WAPxxx Stratix 5100 Wireless Access Point User Manual User Manual
Page 381

Rockwell Automation Publication 1783-UM006A-EN-P - May 2014
381
Configuring WDS, Fast Secure Roaming, Radio Management, and Wireless Intrusion Detection Services
Chapter 13
Understanding Wireless
Intrusion Detection Services
When you implement Wireless Intrusion Detection Services (WIDS) on your
wireless LAN, your access points, WLSE, and an optional (non-Cisco) WIDS
engine work together to detect and prevent attacks on your wireless LAN
infrastructure and associated client devices.
Working with the WLSE, access points can detect intrusions and take action to
defend the wireless LAN. This table describes the features of WIDS.
Feature
Description
Switch port tracing and rogue
suppression
Switch port tracing and suppression uses an RF detection method that produces the
radio MAC address of an unknown radio (a potential rogue device). The WLSE derives
a wired-side MAC address from the wireless MAC address and uses it to search the
switch’s BRIDGE MIB. When one or more searchable MAC addresses are available, the
WLSE uses CDP to discover any switches connected up to two hops away from the
detecting access points. The WLSE examines the BRIDGE MIB of each CDP-discovered
switch to determine if they contain any of the target MAC addresses. If CDP finds any
of the MAC addresses, WLSE suppresses the corresponding switch port number.
Excessive management frame
detection
Excessive management frames indicate an attack on your wireless LAN. An attacker
can carry out a denial-of-service attack by injecting excessive management frames
over the radio to overwhelm access points that have to process the frames. As part of
the WIDS feature set, access points in scanning mode and root access points monitor
radio signals and detect excessive management frames. When they detect excessive
management frames, the access points generate a fault and send it through the WDS
to the WLSE.
Authentication/protection
failure detection
Authentication/protection failure detection looks for attackers who are either trying
to overcome the initial authentication phase on a wireless LAN or to compromise the
ongoing link protection. These detection mechanisms address specific authentication
attacks:
• EAPOL flood detection
• MIC/encryption failures detection
• MAC spoofing detection
Frame capture mode
In frame capture mode, a scanner access point collects 802.11 frames and forwards
them to the address of a WIDS engine on your network.
See the
Configuring Access Points to Participate in WIDS on page 402
for instructions
on configuring the access point to participate in WIDS and
for instructions on configuring the access point for
MFP.
802.11 Management Frame
Protection (MFP)
Wireless is an inherently broadcast medium enabling any device to eavesdrop and
participate either as a legitimate or rogue device. Because control and management
frames are used by client stations to select and initiate a session with an AP, these
frames must be open.
While management frames cannot be encrypted, they must be protected from
forgery. MFP is a means for the 802.11 management frames can be integrity
protected. MFP WLSE for reporting intrusion events. MFP is available on the Straitx
5100 WAP. MFP is available only on 32 Mb platforms.