Detecting Active Exploits; Configuring Maximum Local Database Entries; Using The Gui To Configure Maximum Local Database Entries; Using The Cli To Specify The Maximum Number Of Local Database Entries - Cisco 2100 Series Configuration Manual

Wireless lan controller
Hide thumbs Also See for 2100 Series:
Table of Contents

Advertisement

Detecting Active Exploits

Detecting Active Exploits
The controller supports three active exploit alarms that serve as notifications of potential threats. They
are enabled by default and therefore require no configuration on the controller.

Configuring Maximum Local Database Entries

You can use the controller GUI or CLI to specify the maximum local database entries used for storing
user authentication information. The information in the database is used in conjunction with the
controller's web authentication feature.

Using the GUI to Configure Maximum Local Database Entries

Follow these steps to configure a controller to use the maximum local database entries using the GUI.
Click Security > AAA > General to open the General page (see
Step 1
Figure 5-63
Enter the desired maximum value (on the next controller reboot) in the Maximum Local Database Entries
Step 2
field. The range of possible values is 512 to 2048 (which also includes any configured MAC filter
entries). The default value is 2048. The current value appears in parentheses to the right of the field.
Click Apply to commit your changes.
Step 3
Click Save Configuration to save your settings.
Step 4

Using the CLI to Specify the Maximum Number of Local Database Entries

To configure the maximum number of local database entries using the CLI, enter this command:
config database size max_entries
Cisco Wireless LAN Controller Configuration Guide
5-122
ASLEAP detection—The controller raises a trap event if an attacker launches a LEAP crack tool.
The trap message is visible in the controller's trap log.
Fake access point detection—The controller tweaks the fake access point detection logic to avoid
false access point alarms in high-density access point environments.
Honeypot access point detection—The controller raises a trap event if a rogue access point is using
managed SSIDs (WLANs configured on the controller). The trap message is visible in the
controller's trap log.
General Page
Chapter 5
Configuring Security Solutions
Figure
5-63).
OL-17037-01

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

4400 series

Table of Contents