Wips Summary - Motorola WiNG 5.7.1 System Reference Manual

Table of Contents

Advertisement

13 - 14 WiNG 5.7.1 Access Point System Reference Guide

13.1.8 WIPS Summary

System Statistics
The Wireless Intrusion Protection System (WIPS) provides continuous protection against wireless threats and acts as an
additional layer of security complementing wireless VPNs and existing encryption and authentication policies. Controllers and
service platforms support WIPS through the use of dedicated sensor devices, designed to actively detect and locate
unauthorized AP devices. After detection, they use mitigation techniques to block devices using manual termination, air
lockdown or port suppression.
The
WIPS Summary
devices contributing to the potential poor performance of the RF Domain's network traffic. Additionally, the number of WIPS
events reported by each RF Domain is also listed to help an administrator better mitigate risks to the network.
To review and assess the impact of rogue and interfering access points, as well as the occurrence of WIPS events within the
controller or service platform's managed system:
1. Select the
Statistics
2. Select the
System
3. Select
WIPS Summary
4. Refer to the following WIPS data reported for each RF Domain in the system:
RF Domain
Number of Rogue APs
screen lists RF Domains residing in the system and reports the number of unauthorized and interfering
menu from the Web UI.
node from the left navigation pane.
from the left-hand side of the UI.
Figure 13-8 System - WIPS Summary screen
Lists the RF Domain within the system reporting rogue and interfering access point event
counts. Use this information to assess whether a particular RF Domain is reporting an
excessive number of events or a large number of potentially invasive rogue access
points versus the other RF Domains within the controller, service platform or access
point managed system.
Displays the number of unsanctioned devices in each listed RF Domain. Unsanctioned
devices are those devices detected within the listed RF Domain, but have not been
deployed by a administrator as a known and approved controller or service platform
managed device.

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents