beautypg.com

Wireless topology management, Wids, Wids on msm series acs – H3C Technologies H3C Intelligent Management Center User Manual

Page 26: Wids on comware-based acs, Wips

background image

4

{

Telephone number

{

Total number of APs

{

Total number of terminals for each location view

Wireless topology management

Wireless topology management is an extension of the topology management function of the IMC

Platform. It provides the following topologies:

Wireless device topology—Displays all ACs and fat APs in WSM. You can double-click an AC
or a fat AP in the topology to view its topology.

Location view topology—Displays information about APs and associated clients in location view.

Custom view topology—Displays fit APs and associated clients managed by a specific AC in
custom view.

Mesh topology—Displays AC and fat AP, MPP, MP, and MAP connections in a mesh network
and client information.

WIDS

802.11 networks are susceptible to a wide array of threats such as unauthorized APs and clients, ad

hoc networks, and DoS attacks. Rogue devices are a serious threat to enterprise network security.

WIDS is used for the early detection of malicious attacks and intrusions on a wireless network.
WIDS only manages MSM series and Comware-based ACs.

WIDS on MSM series ACs

You can import the authorized AP list to an AC. The AC uses the authorized AP list to identify

authorized APs, rogue APs, and rogue clients. WIDS lists all rogue APs and rogue clients to provide

you with rogue device information in a network.

WIDS on Comware-based ACs

You can enable WSM to detect rogue devices by configuring the following:

Permitted OUI list

Permitted SSID list

Permitted MAC address list

Attack MAC address list

WIDS detection rules

WIDS detection mode

You can manage detected rogue APs and rogue clients, and add them to or delete them from the

attack device list or permitted list.

WIPS

Wireless intrusion prevention system (WIPS) helps protect enterprise networks and users from

unauthorized wireless access according to user-defined security policies.