NETGEAR ProSafe Premium WNDAP620 Reference Manual page 92

Prosafe premium 3 x 3 dual-band wireless-n access point
Hide thumbs Also See for ProSafe Premium WNDAP620:
Table of Contents

Advertisement

ProSafe Premium 3 x 3 Dual-Band Wireless-N Access Point WNDAP620
Table 24. IDS/IPS policies and policy rules (continued)
Policy
Description
RF jamming attack
Attack. Multiple RF transmissions (100 or more) are sent to the
wireless access point, jamming the radio frequency.
Result. Wireless service is disrupted.
Note:
against this attack.
Virtual carrier attack •
Attack. Multiple frames (60 or more) with a large duration value
are sent to the wireless access point.
Result. Wireless service is disrupted.
Solution. The wireless access point sends a channel change
frame to the legitimate clients and uses automatic channel
selection to switch to a new clear channel.
MAC spoofing
Attack. Several frames (3 or more) that contain the spoofed
MAC address of the wireless access point itself or the spoofed
MAC address of a legitimate client are sent to the wireless
access point.
Result. Wireless security might be compromised.
Note:
action against MAC spoofing.
Rogue AP detection •
Detection. A wireless access point is not in the managed AP
list (see
not connected to the secured wireless or wired network.
Result. Wireless security might be compromised.
Note:
against rogue APs. For information about how to exclude rogue APs
from your network, see
Access Points
Ad-hoc network
Detection. A group of wireless access points are part of an
detected
ad hoc network that might broadcast the same SSID as the
secured wireless network.
Result. Wireless security might be compromised.
Note:
action against ad hoc networks.
Ad-hoc network with
Detection. A group of wireless access points are part of an
wired connectivity
ad hoc network that has a wired connection and that might
broadcast the same SSID as the secured wireless network.
Result. Wireless security might be compromised.
Note:
action against ad hoc networks.
The IDS detects this attack, but the IPS does not take action
The IDS detects MAC spoofing, but the IPS does not take
View and Save Access Point Lists
The IDS detects rogue APs, but the IPS does not take action
Enable Rogue AP Detection and Monitor
on page 85.
The IDS detects ad hoc networks, but the IPS does not take
The IDS detects ad hoc networks, but the IPS does not take
Management and Monitoring
92
Policy Rule
Threshold
100
60
3
0
on page 87) and is
0
0
Notification
Trap
Trap
Trap
Trap
Trap
Trap

Advertisement

Table of Contents
loading

Table of Contents