Dell PowerConnect W-IAP92 Dell Instant 6.1.3.4-3.1.0.0 User Guide - Page 165

Intrusion Detection System, Rogue AP Detection and Classification, Wireless Intrusion Protection (WIP)

Page 165 highlights

Chapter 18 Intrusion Detection System Intrusion Detection System (IDS) is a feature that monitors the network for the presence of unauthorized IAPs and clients. It also logs information about the unauthorized IAPs and clients, and generates reports based on the logged information. Rogue AP Detection and Classification The most important IDS functionality offered in the Dell Instant network is the ability to detect rogue APs, interfering APs, and other devices that can potentially disrupt network operations. An AP is considered to be a rogue AP if it is both unauthorized and plugged into the wired side of the network. An AP is considered to be an interfering AP if it is seen in the RF environment but is not connected to the wired network. While the interfering AP can potentially cause RF interference, it is not considered a direct security threat since it is not connected to the wired network. However, an interfering AP may be reclassified as a rogue AP. Navigate to IDS in the Instant UI and click the IDS link. The built-in IDS scans for access points that are not controller by this Virtual Controller. These are listed below and classified as either Interfering or Rogue, depending on whether they are on a foreign network or your network. Figure 138 Intrusion Detection Wireless Intrusion Protection (WIP) WIP offers a wide selection of intrusion detection and protection features to protect the network against wireless threats. Like most other security-related features of the Dell network, the WIP configuration can be done on the IAP. An administrator can configure the following five main options:  Infrastructure Detection Policies- Specifies which wireless attacks on access points to detect  Client Detection Policies- Specifies which wireless attacks on clients to detect  Infrastructure Protection Policies- Specifies which wireless attacks on access points to protect against  Client Protection Policies- Specifies which wireless attacks on clients to protect against  Containment Methods- To prevent unauthorized stations from connecting to your Instant network. In each of these options there are several default levels that enable different sets of policies. An administrator can customize (enable/disable) these options accordingly. Dell PowerConnect W-Series Instant Access Point 6.1.3.4-3.1.0.0 | User Guide Intrusion Detection System | 165

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246

Dell PowerConnect W-Series Instant Access Point 6.1.3.4-3.1.0.0
|
User Guide
Intrusion Detection System
|
165
Chapter 18
Intrusion Detection System
Intrusion Detection System (IDS) is a feature that monitors the network for the presence of unauthorized IAPs
and clients. It also logs information about the unauthorized IAPs and clients, and generates reports based on the
logged information.
Rogue AP Detection and Classification
The most important IDS functionality offered in the Dell Instant network is the ability to detect rogue APs,
interfering APs, and other devices that can potentially disrupt network operations. An AP is considered to be a
rogue AP if it is both unauthorized and plugged into the wired side of the network. An AP is considered to be an
interfering AP if it is seen in the RF environment but is not connected to the wired network. While the
interfering AP can potentially cause RF interference, it is not considered a direct security threat since it is not
connected to the wired network. However, an interfering AP may be reclassified as a rogue AP.
Navigate to
IDS
in the Instant UI and click the
IDS
link. The built-in IDS scans for access points that are not
controller by this Virtual Controller. These are listed below and classified as either Interfering or Rogue,
depending on whether they are on a foreign network or your network.
Figure 138
Intrusion Detection
Wireless Intrusion Protection (WIP)
WIP offers a wide selection of intrusion detection and protection features to protect the network against wireless
threats. Like most other security-related features of the Dell network, the WIP configuration can be done on the
IAP.
An administrator can configure the following five main options:
Infrastructure Detection Policies— Specifies which wireless attacks on access points to detect
Client Detection Policies— Specifies which wireless attacks on clients to detect
Infrastructure Protection Policies— Specifies which wireless attacks on access points to protect against
Client Protection Policies— Specifies which wireless attacks on clients to protect against
Containment Methods— To prevent unauthorized stations from connecting to your Instant network.
In each of these options there are several default levels that enable different sets of policies. An administrator can
customize (enable/disable) these options accordingly.