Dell PowerConnect W-IAP3WN/P User Manual Page 296

  • Download
  • Add to my manuals
  • Print
  • Page
    / 377
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 295
Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide Intrusion Detection | 296
Chapter 22
Intrusion Detection
The Intrusion Detection System (IDS) is a feature that monitors the network for the presence of unauthorized W-
IAPs and clients. It also logs information about the unauthorized W-IAPs and clients, and generates reports based
on the logged information.
The IDS feature in the Instant network enables you to detect rogue APs, interfering APs, and other devices that can
potentially disrupt network operations.
This chapter describes the following procedures:
l Detecting and Classifying Rogue APs on page 296
l OS Fingerprinting on page 296
l Configuring Wireless Intrusion Protection and Detection Levels on page 297
l Configuring IDSUsing CLI on page 301
Detecting and Classifying Rogue APs
A rogue AP is an unauthorized AP plugged into the wired side of the network.
An interfering AP is an AP seen in the RF environment but it is not connected to the wired network. While the
interfering AP can potentially cause RF interference, it is not considered a direct security threat, because it is not
connected to the wired network. However, an interfering AP may be reclassified as a rogue AP.
To detect the rogue APs, click the IDS link in the Instant main window. The built-in IDS scans for access points that
are not controlled by the Virtual Controller. These are listed and classified as either Interfering or Rogue, depending
on whether they are on a foreign network or your network.
Figure 110 Intrusion Detection
OS Fingerprinting
The OS Fingerprinting feature gathers information about the client that is connected to the Instant network to find the
operating system that the client is running on. The following is a list of advantages of this feature:
l Identifying rogue clients Helps to identify clients that are running on forbidden operating systems.
l Identifying outdated operating systems Helps to locate outdated and unexpected OS in the company network.
l Locating and patching vulnerable operating systems Assists in locating and patching specific operating system
versions on the network that have known vulnerabilities, thereby securing the company network.
OS Fingerprinting is enabled in the Instant network by default. The following operating systems are identified by
Instant:
l Windows 7
Page view 295
1 2 ... 291 292 293 294 295 296 297 298 299 300 301 ... 376 377

Comments to this Manuals

No comments