D-Link DWC-1000 User Manual - Page 286
WIDS Configuration
View all D-Link DWC-1000 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 286 highlights
Wireless Controller User Manual Known Cl i ent: En ab le t h is field t o in clu d e t h e Kn o wn Clien t Dat ab as e in t h e configuration that the controller pus hes to its peers . RADIUS Cl i ent: En ab le t h is field t o in clu d e t h e Clien t RA DIUS in fo rmat io n in t h e configuration that the controller pus hes to its peers . 11.5 WIDS Configuration Th e D-Lin k W ireles s Co n t ro ller W ireles s In t ru s io n Det ect io n Sy s t em (W IDS) can h elp d et ect in t ru sio n at temp ts in t o t h e wireles s n et work an d t ake au tomat ic act io n s t o protect the network. 11.5.1 WIDS AP configration Advanced > WIDS Security > AP The W IDS AP Configuration page allows you to activate or deactivate various threat detection tes ts and s et threat detection thres holds in order to help detect rogue A Ps on the wireles s network. These changes can be done without dis rupting n et wo rk co n n ect iv it y . Sin ce s o me o f t h e wo rk is d o n e b y acces s p o in t s , t h e co n t ro ller n eed s t o s en d mes s ag es t o t h e A Ps t o mo d ify it s W IDS o p erat io n al p ro p e rt ie s Admi ni s trator confi g ured rog ue AP : If t h e s o u rce M A C ad d res s is in t h e v alid A P d at ab ase o n t h e co ntro ller o r o n t h e RA DIUS s erv er an d t h e A P t y p e is marked as Rogue, then the AP s tate is Rogue. Manag ed S S ID from an unk nown AP : Th is t es t ch ecks wh et her an u nkn own A P is u s in g t h e man aged n et work SSID. A h acker may s et u p an A P wit h man ag ed SSID to fool us ers into associating with the A P and revealing password and other s ecure in fo rmat io n . A d min is t rat o rs wit h larg e n et wo rks wh o are u s in g mu lt ip le clu s t ers s h o u ld e it h er u s e d ifferen t n et wo rk n ames in each clu s t er o r d is ab le t h is t es t . Otherwis e, if an AP in the firs t clus ter detects APs in the s econd clus ter t ran s mit t in g t h e s ame SSID as A Ps in t h e firs t clu s t er t h en t h es e A Ps are rep o rt ed as rogues. 284