Mu Intrusion Detection; Configuring Mu Intrusion Detection - Motorola WS5100 Series Reference Manual

Hide thumbs Also See for WS5100 Series:
Table of Contents

Advertisement

3. The
Unapproved APs (Reported by MUs)
BSS MAC Address
Reporting MU
Last Seen (In
Seconds)
ESSID
4. The
Number of Unapproved APs
detected.
5. Click the
Export

6.3 MU Intrusion Detection

Unauthorized attempts to access the switch managed LAN by MUs is a significant threat to the network, and
one that is very pervasive currently. The switch has several means to protect against threats from MUs trying
to find network vulnerabilities.
Use the switch's
Mobile Unit Intrusion Detection
information. The Mobile Unit Intrusion Detection screen provides the following functionalities:

Configuring MU Intrusion Detection

Viewing Filtered MUs
6.3.1 Configuring MU Intrusion Detection
To configure MU intrusion detection:
1. Select
Security
Displays the MAC Address of each Unapproved AP. These MAC addresses are
access points observed on the network (by associated MUs), but have yet to be
added to the list of approved APs, and are therefore interpreted as a threat on the
network.
Displays the numerical value for the detecting MU.
Displays the time (in seconds) the Unapproved AP was last seen on the network
by the detecting MU. Use this interval to determine whether the detected MU is
still a viable threat.
Displays the ESSID of each Unapproved AP. These ESSIDs are device ESSIDs
observed on the network, but have yet to be added to the list of Approved APs and
are therefore interpreted as a threat.
is simply the sum of all of Unapproved Radio MAC Addresses
button to export the contents of the table to a Comma Separated Values file (CSV).
>
Mobile Unit Intrusion Detection
table displays the following information:
facility to view and configure MU intrusion related
from the main tree menu.
6-9
Switch Security

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents