Configuring Monitor Mode Limits; Configuring An Authentication Failure Limit; Configuring Wlsm Failover; Resilient Tunnel Recovery - Cisco M10-RM Software Manual

Cisco ios releases 12.4(10b)ja and 12.3(8)jec
Hide thumbs Also See for M10-RM:
Table of Contents

Advertisement

Configuring WLSM Failover

Configuring Monitor Mode Limits

You can configure threshold values that the access point uses in monitor mode. When a threshold value
is exceeded, the access point logs the information or sends an alert.

Configuring an Authentication Failure Limit

Setting an authentication failure limit protects your network against a denial-of-service attack called
EAPOL flooding. The 802.1X authentication that takes place between a client and the access point
triggers a series of messages between the access point, the authenticator, and an authentication server
using EAPOL messaging. The authentication server, typically a RADIUS server, can quickly become
overwhelmed if there are too many authentication attempts. If not regulated, a single client can trigger
enough authentication requests to impact your network.
In monitor mode the access point tracks the rate at which 802.1X clients attempt to authenticate through
the access point. If your network is attacked through excessive authentication attempts, the access point
generates an alert when the authentication threshold has been exceeded.
You can configure these limits on the access point:
When the access point detects excessive authentication attempts it sets MIB variables to indicate this
information:
Beginning in privileged EXEC mode, follow these steps to set authentication limits that trigger a fault
on the access point:
Command
Step 1
configure terminal
Step 2
dot11 ids eap attempts number
period seconds
Step 3
end
Configuring WLSM Failover
To ensure near hot standby in cases of WLSM failure, the WLSM Version 2.13 Release supports resilient
tunnel recovery and active and standby WLSMs.

Resilient Tunnel Recovery

In the case of a single chassis scenario (only one WLSM per chassis), if the WLSM software fails,
existing access point clients connected to the SUP continue to be connected to the SUP and won't notice
any interruption in service. When an access point detects a WLSM failure, it doesn't tear down the active
Cisco IOS Software Configuration Guide for Cisco Aironet Access Points
12-32
Chapter 12
Configuring WDS, Fast Secure Roaming, Radio Management, and Wireless Intrusion Detection
Number of 802.1X attempts through the access point
EAPOL flood duration in seconds on the access point
An EAPOL flood was detected
Number of authentication attempts
MAC address of the client with the most authentication attempts
Purpose
Enter global configuration mode.
Configure the number of authentication attempts and the
number of seconds of EAPOL flooding that trigger a fault on
the access point.
Return to privileged EXEC mode.
OL-14209-01

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Aironet series

Table of Contents