7 wlan ids configuration, Wlan ids overview, Terminology – H3C Technologies H3C WA2600 Series WLAN Access Points User Manual
Page 46: Wlan ids configuration
7-1
z
The models listed in this document are not applicable to all regions. Please consult your local sales
office for the models applicable to your region.
z
Support of the H3C WA series WLAN access points (APs) for features may vary by AP model. For
more information, see Feature Matrix.
z
The interface types and the number of interfaces vary by AP model.
z
The radio types supported by the H3C WA series WLAN access points vary by AP model.
z
The term AP in this document refers to common APs, wireless bridges, or mesh APs.
7
WLAN IDS Configuration
This chapter includes these sections:
z
z
Configuring IDS Attack Detection
z
Displaying and Maintaining WLAN IDS
z
z
Configuring WIDS-Frame Filtering
z
Displaying and Maintaining WLAN IDS Frame Filtering
z
WLAN IDS Frame Filtering Configuration Example
WLAN IDS Overview
802.11 networks are susceptible to a wide array of threats such as unauthorized access points and
clients, ad-hoc networks, Denial of Service (DoS) attacks. Rogue devices are a serious threat to
enterprise security. WLAN intrusion detection system (IDS) is used for the early detection of malicious
attacks and intrusions on a wireless network. WLAN IPS helps to protect enterprise networks and users
from unauthorized wireless access.
Terminology
z
WLAN intrusion detection system: WLAN IDS is designed to be deployed in an area that an
existing wireless network covers. It aids in the early detection of malicious outsider attacks and
intrusions via the wireless network.
z
Rogue AP: An unauthorized or malicious access point on the network, such as an employee setup
AP, misconfigured AP, neighbor AP or an attacker operated AP. As it is not authorized, if there is
any vulnerability in the AP, the hacker will have chance to compromise your network security.
z
Rogue STA: An unauthorized or malicious station on the network.