D-Link DWC-2000-AP32-LIC User Manual - Page 67

Configure AP WIDS Settings

Page 67 highlights

Section 6 - Securing Your Network WIDS The Wireless Intrusion Detection System (WIDS) can help detect intrusion attempts into the wireless network and take automatic actions to protect the network. Configure AP WIDS Settings Path: Wireless > General > WIDS > AP WIDS Security The WIDS AP Configuration page allows you to activate or deactivate various threat detection tests and set threat detection thresholds in order to help detect rogue APs on the wireless network. These changes can be done without disrupting network connectivity. Since some of the work is done by access points, the controller needs to send messages to the APs to modify its WIDS operational properties. Note: The classification settings on the WIDS AP Configuration page are part of the global configuration on the controller and must be manually pushed to other controllers in order to synchronize that configuration. Many of the tests are focused on identifying APs that are advertising managed SSIDs, but are not in fact managed APs. Detecting such an AP means that a network is either miss‐configured or that a hacker set up a honeypot AP in the attempt to collect passwords or other secure information. Although operational mode radios can detect most threats, the sentry radios detect the threats faster, especially when a potential rogue is operating on a different channel from any of the managed AP radios. The number of deployed sentry radios should be sufficient to provide coverage by one sentry radio in every geographical location within the network. A denser sentry deployment may be desirable in order to improve rogue or interferer signal triangulation. To configure WIDS AP: 1. Go to Wireless > General > WIDS > AP WIDS Security tab. D-Link DWC-2000 User Manual 67

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282

D-Link DWC-2000 User Manual
67
Section 6 - Securing Your Network
WIDS
The Wireless Intrusion Detection System (WIDS) can help detect intrusion attempts into the wireless network
and take automatic actions to protect the network.
Configure AP WIDS Settings
Path: Wireless > General > WIDS > AP WIDS Security
The WIDS AP Configuration page allows you to activate or deactivate various threat detection tests and set threat
detection thresholds in order to help detect rogue APs on the wireless network. These changes can be done
without disrupting network connectivity. Since some of the work is done by access points, the controller needs
to send messages to the APs to modify its WIDS operational properties.
Note:
The classification settings on the WIDS AP Configuration page are part of the global configuration on the
controller and must be manually pushed to other controllers in order to synchronize that configuration.
Many of the tests are focused on identifying APs that are advertising managed SSIDs, but are not in fact managed
APs. Detecting such an AP means that a network is either miss‐configured or that a hacker set up a honeypot AP
in the attempt to collect passwords or other secure information.
Although operational mode radios can detect most threats, the sentry radios detect the threats faster, especially
when a potential rogue is operating on a different channel from any of the managed AP radios. The number
of deployed sentry radios should be sufficient to provide coverage by one sentry radio in every geographical
location within the network. A denser sentry deployment may be desirable in order to improve rogue or interferer
signal triangulation.
To configure WIDS AP:
1. Go to
Wireless
>
General
>
WIDS
>
AP WIDS Security
tab.