Dell W-Series 207 Instant 6.5.1.0-4.3.1.0 User Guide - Page 328

Intrusion Detection, Detecting and Classifying Rogue W-IAPs, OS Fingerprinting,

Page 328 highlights

Chapter 27 Intrusion Detection The Intrusion Detection System (IDS) is a feature that monitors the network for the presence of unauthorized W-IAPs and clients. It also logs information about the unauthorized W-IAPs and clients, and generates reports based on the logged information. The IDS feature in the Instant network enables you to detect rogue W-IAPs, interfering W-IAPs, and other devices that can potentially disrupt network operations. This chapter describes the following procedures: l Detecting and Classifying Rogue W-IAPs on page 328 l OS Fingerprinting on page 328 l Configuring Wireless Intrusion Protection and Detection Levels on page 329 l Configuring IDS on page 334 Detecting and Classifying Rogue W-IAPs A rogue W-IAP is an unauthorized W-IAP plugged into the wired side of the network. An interfering W-IAP is an W-IAP seen in the RF environment but it is not connected to the wired network. While the interfering W-IAP can potentially cause RF interference, it is not considered a direct security threat, because it is not connected to the wired network. However, an interfering W-IAP may be reclassified as a rogue W-IAP. To detect the rogue W-IAPs, click the IDS link in the Instant main window. The built-in IDS scans for access points that are not controlled by the VC. These are listed and classified as either Interfering or Rogue, depending on whether they are on a foreign network or your network. Figure 95 Intrusion Detection OS Fingerprinting The OS Fingerprinting feature gathers information about the client that is connected to the Instant network to find the operating system that the client is running on. The following is a list of advantages of this feature: l Identifying rogue clients-Helps to identify clients that are running on forbidden operating systems. l Identifying outdated operating systems-Helps to locate outdated and unexpected OS in the company network. l Locating and patching vulnerable operating systems-Assists in locating and patching specific operating system versions on the network that have known vulnerabilities, thereby securing the company network. OS Fingerprinting is enabled in the Instant network by default. The following operating systems are identified by Instant: Dell Networking W-Series Instant 6.5.1.0-4.3.1.0 | User Guide Intrusion Detection | 328

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435

Dell Networking W-Series Instant 6.5.1.0-4.3.1.0 | User Guide
Intrusion Detection |
328
Chapter 27
Intrusion Detection
The Intrusion Detection System (IDS) is a feature that monitors the network for the presence of unauthorized
W-IAPs and clients. It also logs information about the unauthorized W-IAPs and clients, and generates reports
based on the logged information.
The IDS feature in the Instant network enables you to detect rogue W-IAPs, interfering W-IAPs, and other
devices that can potentially disrupt network operations.
This chapter describes the following procedures:
l
Detecting and Classifying Rogue W-IAPs on page 328
l
OS Fingerprinting on page 328
l
Configuring Wireless Intrusion Protection and Detection Levels on page 329
l
Configuring IDS on page 334
Detecting and Classifying Rogue W-IAPs
A rogue W-IAP is an unauthorized W-IAP plugged into the wired side of the network.
An interfering W-IAP is an W-IAP seen in the RF environment but it is not connected to the wired network. While
the interfering W-IAP can potentially cause RF interference, it is not considered a direct security threat, because
it is not connected to the wired network. However, an interfering W-IAP may be reclassified as a rogue W-IAP.
To detect the rogue W-IAPs, click the
IDS
link in the Instant main window. The built-in IDS scans for access
points that are not controlled by the VC. These are listed and classified as either Interfering or Rogue,
depending on whether they are on a foreign network or your network.
Figure 95
Intrusion Detection
OS Fingerprinting
The OS Fingerprinting feature gathers information about the client that is connected to the Instant network to
find the operating system that the client is running on. The following is a list of advantages of this feature:
l
Identifying rogue clients—Helps to identify clients that are running on forbidden operating systems.
l
Identifying outdated operating systems—Helps to locate outdated and unexpected OS in the company
network.
l
Locating and patching vulnerable operating systems—Assists in locating and patching specific operating
system versions on the network that have known vulnerabilities, thereby securing the company network.
OS Fingerprinting is enabled in the Instant network by default. The following operating systems are identified
by Instant: