beautypg.com
xi
23 Managing wireless network security
··············································································································· 397
IDS feature overview ···················································································································································· 397
IDS on Comware-based ACs ····························································································································· 397
IDS on MSM series ACs ····································································································································· 397
Accessing the WIDS Config page ····························································································································· 398
Querying ACs on the WIDS Config page ················································································································ 399
Enabling/Disabling IDS for MSM series ACs ··········································································································· 399
Enabling/disabling fit APs to detect rogue APs ········································································································ 400
Exporting authorized APs ············································································································································ 402
Importing authorized APs ············································································································································ 402
Configuring WIDS detection rules for Comware-based ACs ·················································································· 403
Maintaining the permitted-OUI list of an AC ···································································································· 404
Maintaining the permitted-SSID list of an AC ··································································································· 404
Maintaining the permitted-MAC address list of an AC ··················································································· 405
Maintaining the MAC-to-attack list of an AC ··································································································· 405
Managing rogue APs ·················································································································································· 405
Displaying the rogue AP list ······························································································································· 406
Querying rogue APs············································································································································ 406
Viewing detailed information about a Comware-based rogue AP ································································ 407
Adding Comware-based rogue APs to the MAC-to-attack list ········································································ 408
Removing Comware-based rogue APs from the MAC-to-attack list ······························································· 409
Adding Comware-based rogue APs to the permitted-MAC address list ······················································· 410
Locating a rogue AP ············································································································································ 410
Viewing detailed information about an MSM series rogue AP ······································································ 411
Manually authorizing an MSM series rogue AP ······························································································ 412
Managing rogue clients ·············································································································································· 412
Displaying the rogue client list ··························································································································· 412
Querying rogue clients ······································································································································· 413
Viewing detailed information about a rogue client ························································································· 414
Adding rogue clients to the MAC-to-attack list ································································································· 416
Removing rogue clients from the MAC-to-attack list························································································· 416
Adding rogue clients to the permitted-MAC address list ················································································· 417
Locating a rogue client ······································································································································· 417
24 Configuring WLAN IPS
····································································································································· 419
Overview ······································································································································································· 419
Terminology ·································································································································································· 419
WIPS networking ·························································································································································· 420
Basic WIPS configurations ·········································································································································· 421
Accessing the WIPS Management page ·········································································································· 421
Enabling WIPS ····················································································································································· 421
Configuring time parameters ····························································································································· 421
Configuring the permitted channel list ·············································································································· 422
Configuring the static trusted address list ········································································································· 422
Configuring the alarm-ignored address list ······································································································ 424
Configuring the static blocked address list ······································································································· 426
Configuring the static countermeasures address list ························································································ 429
Configuring the static trusted OUI list ··············································································································· 431
Configuring the function set ······························································································································· 432
Configuring sensors ····················································································································································· 433
Viewing the sensor list ········································································································································ 433
Synchronizing the sensor list ······························································································································ 434
Querying sensors ················································································································································· 435
Adding a sensor ·················································································································································· 435
Binding sensors to a virtual security domain ···································································································· 436