
Configuring Wireless Intrusion Prevention
Rogue Access Points
126
Ruckus Wireless, Inc.
•
SSID-Spoofing
: These are rogue access points that are beaconing the same
SSID name as a ZoneDirector-managed access point. They pose a threat as
someone may be attempting to use them as a honey pot to attract your clients
into their network to attempt hacking or man-in-the-middle attacks to exploit
passwords and other sensitive data.
•
Same-Network
: These are rogue access points that are detected by other
access points as transmitting traffic on your internal network. They are detected
by ZoneDirector-managed access points seeing packets coming from a 'similar'
MAC address to one of those detected from an over the air rogue AP. Similar
MAC addresses are +-5 MAC address lower or higher than the detected over
the air MAC address.
•
MAC-spoofing
: These are rogue access points that are beaconing the same
MAC address as a ZoneDirector-managed access point. They pose a threat as
someone may be attempting to use them as a honey pot to attract your clients
into their network to attempt hacking or man-in-the-middle attacks to exploit
passwords and other sensitive data.
The last type of malicious rogue device is “User Marked.” These are devices that
are manually marked as malicious rogues by a ZoneDirector administrator using the
Mark as Malicious
button on the
Monitor > Rogue Devices
page.
To configure intrusion detection and prevention options:
1
In the
Intrusion Detection and Prevention
section, configure the following
settings:
•
Enable report rogue devices
: Enabling this check box allows ZoneDirector
to include rogue device detection in logs and email alarm event notifications.
-
Report all rogue devices
: Send alerts for all rogue AP events.
-
Report only malicious rogue devices of type
: Select which event types to
report.
•
Protect the network from malicious rogue access points
: Enable this
feature to automatically protect your network from network connected rogue
APs, SSID-spoofing APs and MAC-spoofing APs. When one of these rogue
APs is detected (and this check box is enabled), the Ruckus AP automatically
begins sending broadcast de-authentication messages spoofing the rogue’s
BSSID (MAC) to prevent wireless clients from connecting to the malicious
rogue AP. This option is disabled by default.
2
Click the
Apply
button that is in the same section to save your changes.
Summary of Contents for ZoneDirector 3000
Page 2: ......
Page 4: ...4 Ruckus Wireless Inc...
Page 16: ...Documentation Feedback 16 Ruckus Wireless Inc...
Page 106: ...Enabling Bonjour Gateway Example Network Setup 106 Ruckus Wireless Inc...
Page 298: ...Monitoring Location Services Access Point Sensor Information 298 Ruckus Wireless Inc...
Page 342: ...Working with Guest Passes Delivering Guest Passes via SMS 342 Ruckus Wireless Inc...
Page 364: ...Best Practices and Recommendations Recovering an Isolated Mesh AP 364 Ruckus Wireless Inc...
Page 388: ...Support Entitlement Upgrading the License with Smart Redundancy 388 Ruckus Wireless Inc...
Page 410: ...Restarting ZoneDirector Streaming Mode 410 Ruckus Wireless Inc...
Page 420: ...Best Practice Checklist Elevation of RAPs and MAPs 420 Ruckus Wireless Inc...
Page 428: ...428 Ruckus Wireless Inc band selection 236 255 ZoneFlex APs upgrading software 368...
Page 429: ...ZoneDirector 9 8 User Guide 800 70599 001 Rev B 429...