beautypg.com

Maintaining the mac-to-attack list of an ac, Managing rogue aps – H3C Technologies H3C Intelligent Management Center User Manual

Page 427

background image

405

Maintaining the permitted-MAC address list of an AC

To allow an AP to provide services or a mobile user to access the wireless network, add the MAC

address to the permitted-MAC address list.
To add a permitted MAC address:

1.

Click the Service tab.

2.

From the navigation tree, select WLAN Manager > WIDS Management > WIDS Config.
The WIDS Config page displays all ACs.

3.

Click the Operation icon

for a Comware-based AC, and then select WIDS Detection Rule

from the shortcut menu.
The WIDS Detection Rule page appears.

4.

Click the Permitted MAC tab.

5.

Use either of the following methods to add a permitted MAC address:

a.

Enter the permitted MAC address in the format hh:hh:hh:hh:hh:hh in the Permitted MAC field
and click Add.

b.

Click Select Rogue List, select the MAC addresses to be permitted, and click OK.

To delete a permitted MAC address, select the MAC address from the Permitted MAC List and click

Delete.

Maintaining the MAC-to-attack list of an AC

To prevent a rogue client or AP from accessing the network or providing wireless services, add its

MAC address to the MAC-to-attack list. ACs can attack only rogue APs on the MAC-to-attack list.
To add a MAC address to be attacked:

1.

Click the Service tab.

2.

From the navigation tree, select WLAN Manager > WIDS Management > WIDS Config.
The WIDS Config page displays all ACs.

3.

Click the Operation icon

for a Comware-based AC, and then select WIDS Detection Rule

from the shortcut menu.
The WIDS Detection Rule page appears.

4.

Click the MAC to Attack tab.

5.

Use either of the following methods to add a MAC address to be attacked:

a.

Enter the MAC address in the format hh:hh:hh:hh:hh:hh in the MAC to Attack field and click

Add.

b.

Click Select Rogue List, select the MAC addresses to be attacked, and click OK.

To delete a MAC address to be attacked, from the MAC-to-Attack List, select the MAC address and

click Delete.

Managing rogue APs

WSM provides a set of functions for you to manage rogue APs.