beautypg.com

7 wlan ids configuration, Wlan ids overview, Terminology – H3C Technologies H3C WA2600 Series WLAN Access Points User Manual

Page 46: Wlan ids configuration

background image

7-1

z

The models listed in this document are not applicable to all regions. Please consult your local sales

office for the models applicable to your region.

z

Support of the H3C WA series WLAN access points (APs) for features may vary by AP model. For

more information, see Feature Matrix.

z

The interface types and the number of interfaces vary by AP model.

z

The radio types supported by the H3C WA series WLAN access points vary by AP model.

z

The term AP in this document refers to common APs, wireless bridges, or mesh APs.

7

WLAN IDS Configuration

This chapter includes these sections:

z

WLAN IDS Overview

z

Configuring IDS Attack Detection

z

Displaying and Maintaining WLAN IDS

z

Frame Filtering

z

Configuring WIDS-Frame Filtering

z

Displaying and Maintaining WLAN IDS Frame Filtering

z

WLAN IDS Frame Filtering Configuration Example

WLAN IDS Overview

802.11 networks are susceptible to a wide array of threats such as unauthorized access points and

clients, ad-hoc networks, Denial of Service (DoS) attacks. Rogue devices are a serious threat to

enterprise security. WLAN intrusion detection system (IDS) is used for the early detection of malicious

attacks and intrusions on a wireless network. WLAN IPS helps to protect enterprise networks and users

from unauthorized wireless access.

Terminology

z

WLAN intrusion detection system: WLAN IDS is designed to be deployed in an area that an

existing wireless network covers. It aids in the early detection of malicious outsider attacks and

intrusions via the wireless network.

z

Rogue AP: An unauthorized or malicious access point on the network, such as an employee setup

AP, misconfigured AP, neighbor AP or an attacker operated AP. As it is not authorized, if there is

any vulnerability in the AP, the hacker will have chance to compromise your network security.

z

Rogue STA: An unauthorized or malicious station on the network.

This manual is related to the following products: