Security Configuration 8 - 33
Figure 8-20
Wireless IPS screen - WIPS Events - AP Anomaly tab
AP Anomaly events are suspicious frames sent by neighboring APs. Use the
AP Anomaly
tab to enable or disable an event.
17. Enable or disable the following
AP Anomaly Events
:
18. Select
OK
to save the updates to the
AP Anomaly configuration used by the WIPS policy. Select
Reset
to revert to the last
saved configuration. The WIPS policy can be invoked at any point in the configuration process by selecting
Activate
Wireless IPS Policy
from the upper, left-hand side, of the access point user interface.
19. Select the
WIPS Signatures
tab. Ensure the
Activate Wireless IPS Policy
option remains selected to enable the
screen’s configuration parameters.
A WIPS signature is the set or parameters, or pattern, used by WIPS to identify and categorize particular sets of attack
behaviors in order to classify them.
Name
Displays the name of the excessive action event representing a potential threat to the
network. This column lists the event being tracked against the defined thresholds set for
interpreting the event as excessive or permitted.
Enable
Displays whether tracking is enabled for each AP Anomaly event. Use the drop-down
menu to enable/disable events as required. A green check mark defines the event as
enabled for tracking against its threshold values. A red “X” defines the event as disabled
and not tracked by the WIPS policy. Each event is disabled by default.
Summary of Contents for AP-7131 Series
Page 1: ...Motorola Solutions WiNG 5 5 ACCESS POINT SYSTEM REFERENCE GUIDE ...
Page 2: ......
Page 14: ...x WiNG 5 5 Access Point System Reference Guide ...
Page 22: ...8 WiNG 5 5 Access Point System Reference Guide ...
Page 26: ...1 4 WiNG 5 5 Access Point System Reference Guide ...
Page 74: ...3 36 WiNG 5 5 Access Point System Reference Guide ...
Page 428: ...6 2 WiNG 5 5 Access Point System Reference Guide Figure 6 1 Configuration Wireless menu ...
Page 528: ...6 102 WiNG 5 5 Access Point System Reference Guide ...
Page 610: ...8 40 WiNG 5 5 Access Point System Reference Guide ...
Page 615: ...Services Configuration 9 5 Figure 9 2 Captive Portal Policy screen Basic Configuration tab ...
Page 656: ...9 46 WiNG 5 5 Access Point System Reference Guide ...
Page 670: ...10 14 WiNG 5 5 Access Point System Reference Guide ...
Page 682: ...11 12 WiNG 5 5 Access Point System Reference Guide ...
Page 721: ...Operations 12 39 Figure 12 40 Certificate Management Import New Trustpoint screen ...
Page 738: ...12 56 WiNG 5 5 Access Point System Reference Guide ...
Page 890: ...A 2 WiNG 5 5 Access Point System Reference Guide ...
Page 952: ...B 62 WiNG 5 5 Access Point System Reference Guide ...
Page 953: ......