8 - 32 WiNG 5.5 Access Point System Reference Guide
MU Anomaly
events are suspicious events by wireless clients that can compromise the security and stability of the network.
Use the MU Anomaly screen to set the intervals clients can be filtered upon the generation of each event.
14. Set the following
MU Anomaly Event
configurations:
15. Select
OK
to save the updates to the
MU Anomaly configuration used by the WIPS policy. Select
Reset
to revert to the last
saved configuration. The WIPS policy can be invoked at any point in the configuration process by selecting
Activate
Wireless IPS Policy
from the upper, left-hand side, of the access point user interface.
16. Select the
AP Anomaly
tab. Ensure the
Activate Wireless IPS Policy
option remains selected to enable the screen’s
configuration parameters.
Name
Displays the name of the excessive action event representing a potential threat to the
network. This column lists the event being tracked against the defined thresholds set for
interpreting the event as excessive or permitted.
Enable
Displays whether tracking is enabled for each MU Anomaly event. Use the drop-down
menu to enable/disable events as required. A green checkmark defines the event as
enabled for tracking against its threshold. A red “X” defines the event as disabled, and
not tracked by the WIPS policy. Each event is disabled by default.
Filter Expiration
Set the duration a client is filtered. This creates a special ACL entry, and frames coming
from the client are silently dropped. The default setting is 0 seconds. For each violation,
define a time to filter value (in seconds) which determines how long received packets are
ignored from an attacking device once a violation has been triggered. Ignoring frames
from an attacking device minimizes the effectiveness of the attack and the impact to the
site until permanent mitigation can be performed.
Summary of Contents for AP-7131 Series
Page 1: ...Motorola Solutions WiNG 5 5 ACCESS POINT SYSTEM REFERENCE GUIDE ...
Page 2: ......
Page 14: ...x WiNG 5 5 Access Point System Reference Guide ...
Page 22: ...8 WiNG 5 5 Access Point System Reference Guide ...
Page 26: ...1 4 WiNG 5 5 Access Point System Reference Guide ...
Page 74: ...3 36 WiNG 5 5 Access Point System Reference Guide ...
Page 428: ...6 2 WiNG 5 5 Access Point System Reference Guide Figure 6 1 Configuration Wireless menu ...
Page 528: ...6 102 WiNG 5 5 Access Point System Reference Guide ...
Page 610: ...8 40 WiNG 5 5 Access Point System Reference Guide ...
Page 615: ...Services Configuration 9 5 Figure 9 2 Captive Portal Policy screen Basic Configuration tab ...
Page 656: ...9 46 WiNG 5 5 Access Point System Reference Guide ...
Page 670: ...10 14 WiNG 5 5 Access Point System Reference Guide ...
Page 682: ...11 12 WiNG 5 5 Access Point System Reference Guide ...
Page 721: ...Operations 12 39 Figure 12 40 Certificate Management Import New Trustpoint screen ...
Page 738: ...12 56 WiNG 5 5 Access Point System Reference Guide ...
Page 890: ...A 2 WiNG 5 5 Access Point System Reference Guide ...
Page 952: ...B 62 WiNG 5 5 Access Point System Reference Guide ...
Page 953: ......