Dell PowerConnect W-Airwave W-Airwave 7.2 Configuration Guide - Page 88

Allow Well Known MAC, Routers using the IANA MAC OUI 00:00:5e.

Page 88 highlights

Table 34 Profiles > IDS > Unauthorized Devices Profile Settings (Continued) Field Default Description Overlay Rogue AP Yes Set Overlay Rogue Classification, which is classification through valid/rogue APs. A Classification controller uses the wired-mac table of other valid and rogue APs as equivalents of the wired MACs that it sees on our network. When this match is triggered, it makes a note of the AP that helped in this process, and this info will be displayed as the Helper-AP. Valid Wired MACs Blank Text Set a list of MAC addresses of wired devices in the network, typically gateways or Field servers. Rogue Containment No By default, rogue APs are only detected but are not automatically disabled. This option automatically shuts down rogue APs. When this option is enabled, clients attempting to associate to a rogue AP will be disconnected from the rogue AP through a denial of service attack. Allow Well Known MAC Allow devices with known MAC addresses to classify rogues APs. Depending on your network, configure one or more of the following options for classifying rogue APs:  hsrp-Routers configured for HSRP, a Cisco-proprietary redundancy protocol, with the HSRP MAC OUI 00:00:0c.  iana-Routers using the IANA MAC OUI 00:00:5e.  local-mac-Devices with locally administered MAC addresses starting with 02.  vmware-Devices with any of the following VMWare OUIs: 00:0c:29, 00:05:69, or 00:50:56  vmware1-Devices with VMWare OUI 00:0c:29.  vmware2-Devices with VMWare OUI 00:05:69.  vmware3-Devices with VMWare OUI 00:50:56. If you modify an existing configuration, the new configuration overrides the original configuration. For example, if you configure allow-well-known-mac hsrp and then configure allow-well-known-mac iana, the original configuration is lost. Suspected Rogue No Use this setting to treat suspected rogue APs as interfering APs; thereby the controller Containment attempts to reclassify them as rogue APs. By default, suspected rogue APs are not automatically contained. In combination with the suspected rogue containment confidence level, this option automatically shuts down suspected rogue APs. When this option is enabled, clients attempting to associate to a suspected rogue AP will be disconnected from the suspected rogue AP through a denial of service attack. Suspected Rogue 60 Containment Confidence Level (50-100) Set the confidence level. When an AP is classified as a suspected rogue AP, it is assigned a 50% confidence level. If multiple APs trigger the same events that classify the AP as a suspected rogue, the confidence level increases by 5% up to 95%. In combination with suspected rogue containment, this option configures the threshold by which containment should occur. Suspected rogue containment occurs only when the configured confidence level is met. Protect Valid Stations No Use this setting to disallow valid stations from connecting to a non-valid AP. Detect Bad WEP No Enable or disable detection of WEP initialization vectors that are known to be weak. A primary means of cracking WEP keys is to capture 802.11 frames over an extended period of time and searching for such weak implementations that are still used by many legacy devices. Detect Misconfigured AP No Enable or disable detection of misconfigured APs. An AP is classified as misconfigured if it does not meet any of the following configurable parameters:  Valid channels  Encryption type  Short preamble  List of valid AP MAC OUIs  Valid SSID list 88 | Dell PowerConnect W Configuration Reference Dell PowerConnect W AirWave 7.2 | Configuration Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160

88
|
Dell PowerConnect W Configuration Reference
Dell PowerConnect W AirWave 7.2
| Configuration Guide
Overlay Rogue AP
Classification
Yes
Set Overlay Rogue Classification, which is classification through valid/rogue APs. A
controller uses the wired-mac table of other valid and rogue APs as equivalents of the
wired MACs that it sees on our network. When this match is triggered, it makes a note
of the AP that helped in this process, and this info will be displayed as the Helper-AP.
Valid Wired MACs
Blank Text
Field
Set a list of MAC addresses of wired devices in the network, typically gateways or
servers.
Rogue Containment
No
By default, rogue APs are only detected but are not automatically disabled. This option
automatically shuts down rogue APs. When this option is enabled, clients attempting to
associate to a rogue AP will be disconnected from the rogue AP through a denial of
service attack.
Allow Well Known MAC
Allow devices with known MAC addresses to classify rogues APs.
Depending on your network, configure one or more of the following options for
classifying rogue APs:
hsrp
—Routers configured for HSRP, a Cisco-proprietary redundancy protocol, with
the HSRP MAC OUI 00:00:0c.
iana
—Routers using the IANA MAC OUI 00:00:5e.
local-mac
—Devices with locally administered MAC addresses starting with 02.
vmware
—Devices with any of the following VMWare OUIs: 00:0c:29, 00:05:69, or
00:50:56
vmware1
—Devices with VMWare OUI 00:0c:29.
vmware2
—Devices with VMWare OUI 00:05:69.
vmware3
—Devices with VMWare OUI 00:50:56.
If you modify an existing configuration, the new configuration overrides the original
configuration. For example, if you configure allow-well-known-mac hsrp and then
configure allow-well-known-mac iana, the original configuration is lost.
Suspected Rogue
Containment
No
Use this setting to treat suspected rogue APs as interfering APs; thereby the controller
attempts to reclassify them as rogue APs. By default, suspected rogue APs are not
automatically contained.
In combination with the suspected rogue containment confidence level, this option
automatically shuts down suspected rogue APs. When this option is enabled, clients
attempting to associate to a suspected rogue AP will be disconnected from the
suspected rogue AP through a denial of service attack.
Suspected Rogue
Containment Confidence
Level
(50-100)
60
Set the confidence level. When an AP is classified as a suspected rogue AP, it is
assigned a 50% confidence level. If multiple APs trigger the same events that classify
the AP as a suspected rogue, the confidence level increases by 5% up to 95%.
In combination with suspected rogue containment, this option configures the threshold
by which containment should occur. Suspected rogue containment occurs only when
the configured confidence level is met.
Protect Valid Stations
No
Use this setting to disallow valid stations from connecting to a non-valid AP.
Detect Bad WEP
No
Enable or disable detection of WEP initialization vectors that are known to be weak. A
primary means of cracking WEP keys is to capture 802.11 frames over an extended
period of time and searching for such weak implementations that are still used by many
legacy devices.
Detect Misconfigured AP
No
Enable or disable detection of misconfigured APs. An AP is classified as misconfigured
if it does not meet any of the following configurable parameters:
Valid channels
Encryption type
Short preamble
List of valid AP MAC OUIs
Valid SSID list
Table 34
Profiles > IDS > Unauthorized Devices Profile Settings
(Continued)
Field
Default
Description