Intrusion Detection - Allen-Bradley Stratix 5100 User Manual

Wireless access point/workgroup bridge
Hide thumbs Also See for Stratix 5100:
Table of Contents

Advertisement

Table 36 - Certificates Page Properties Parameter Descriptions
Parameter
Authentication Methods Profile
Current Authentication Methods
Profile
Credentials Name
Authentication Methods

Intrusion Detection

Management frame protection can be used to identify adversaries that are
invoking denial of service attacks, flooding the network with associations and
probes, interjecting as rogue access points, or affecting the network performance
by attacking the QoS and radio measurement frames.
Figure 51 - Management Frame Protection
Rockwell Automation Publication 1783-UM006A-EN-P - May 2014
Stratix 5100 Device Manager Parameter Definitions
Description
Credential profiles are applied to an interface or an SSID in the same way. When
an access point connects to the network, the access point and the network
authentication device negotiate to agree upon an authentication method
supported by both devices to complete authentication. An authentication
methods profile is used to restrict the types of authentication that the access
point agrees to use.
If you wish to restrict the authentication types used to authenticate to the
network, define an authentication methods profile and assign it to the relevant
SSIDs or FastEthernet interface. The restriction may be required to prevent the
network authentication server and the access point from negotiating an
authentication method such as LEAP rather than a more secure authentication
method such as EAP-FAST.
Choose <NEW> if you want to add an authentication methods profile.
Enter a name for the authentication methods profile if you are adding a new
profile. You can change the name if you have chosen an existing profile.
Choose the authentication methods that the access point should use to
authenticate to the network. By choosing a strong authentication method, you
can prevent the access point from allowing weaker authentication methods to be
approved. For example, if a RADIUS server supports EAP-FAST and LEAP, under
certain configurations, the server might initially employ LEAP instead of a more
secure method. If no preferred method list is defined in this parameter, LEAP may
be chosen rather than the stronger, more advantageous EAP-FAST.
Chapter 4
127

Advertisement

Table of Contents
loading

This manual is also suitable for:

1783-wapak91783-wapek91783-wapck91783-wapzk9

Table of Contents