•
Report only malicious rogue devices of type
: Select which event types to
report.
•
Protect the network from malicious rogue access points
: Enable this feature
to automatically protect your network from network connected rogue APs,
SSID-spoofing APs and MAC-spoofing APs. When one of these rogue APs is
detected (and this check box is enabled), the Ruckus AP automatically begins
sending broadcast de-authentication messages spoofing the rogue’s BSSID
(MAC) to prevent wireless clients from connecting to the malicious rogue AP. This
option is disabled by default.
3.
Click the
Apply
button in the same section to save your changes.
Figure 81: Intrusion Prevention option
See
on page 292 for more information on monitoring
and handling rogue devices.
Rogue DHCP Server Detection
A rogue DHCP server is a DHCP server that is not under the control of network
administrators and is therefore unauthorized.
When a rogue DHCP server is introduced to the network, it could start assigning invalid
IP addresses, disrupting network connections or preventing client devices from accessing
network services. It could also be used by hackers to compromise network security.
Typically, rogue DHCP servers are network devices (such as routers) with built-in DHCP
server capability that has been enabled (often, unknowingly) by users. ZoneDirector has
a rogue DHCP server detection feature that can help you prevent connectivity and security
issues that rogue DHCP servers may cause. When this feature is enabled, ZoneDirector
scans the network every five seconds for unauthorized DHCP servers and generates an
event every time it detects a rogue DHCP server.
Ruckus Wireless ZoneDirector™ Release 10.0 User Guide
124
Configuring Security and Other Services
Configuring Wireless Intrusion Prevention