Intrusion Detection System; Rogue Ap Detection And Classification; Wireless Intrusion Protection (Wip) - Dell PowerConnect W-IAP3WN User Manual

Instant access point
Hide thumbs Also See for PowerConnect W-IAP3WN:
Table of Contents

Advertisement

Intrusion Detection System (IDS) is a feature that monitors the network for the presence of
unauthorized W-IAPs and clients. It also logs information about the unauthorized W-IAPs and
clients, and generates reports based on the logged information.

Rogue AP Detection and Classification

The most important IDS functionality offered in the Dell  W-Instant network is the ability to
detect rogue APs, interfering APs, and other devices that can potentially disrupt network
operations. An AP is considered to be a rogue AP if it is both unauthorized and plugged into the
wired side of the network. An AP is considered to be an interfering AP if it is seen in the RF
environment but is not connected to the wired network. While the interfering AP can potentially
cause RF interference, it is not considered a direct security threat since it is not connected to the
wired network. However, an interfering AP may be reclassified as a rogue AP.
Navigate to IDS in the Dell W-Series Instant UI and click the IDS link. The built-in IDS scans
for access points that are not controller by this Virtual Controller. These are listed below and
classified as either Interfering or Rogue, depending on whether they are on a foreign network or
your network.
- Intrusion Detection
Figure 126

Wireless Intrusion Protection (WIP)

WIP offers a wide selection of intrusion detection and protection features to protect the network
against wireless threats. Like most other security-related features of the Dell network, the WIP
configuration can be done on the W-IAP.
An administrator can configure the following five main options.
Infrastructure Detection Policies— Specifies which wireless attacks on access points to detect
l
Client Detection Policies— Specifies which wireless attacks on clients to detect
l
Infrastructure Protection Policies— Specifies which wireless attacks on access points to
l
protect against
Client Protection Policies— Specifies which wireless attacks on clients to protect against
l
Containment Methods— Prevents unauthorized stations from connecting to your W-Instant
l
network.
Dell PowerConnect W-Series Instant Access Point
Chapter 18

Intrusion Detection System

6.2.0.0-3.2.0.0
|
User Guide
177
|
Intrusion Detection System

Advertisement

Table of Contents
loading

This manual is also suitable for:

Powerconnect b-rx4Powerconnect w-series

Table of Contents