
425
WLAN security configuration
WLAN security overview
802.11 networks are susceptible to a wide array of threats such as unauthorized access points and clients,
ad hoc networks, and Denial of Service (DoS) attacks. To ensure security, the wireless intrusion detection
system (WIDS) is introduced. WIDS provides early detection of malicious attacks and intrusions on a
wireless network without affecting network performance, and provides real-time countermeasures.
WLAN security provides these features:
•
WIDS attack detection
•
Blacklist and white list
WIDS attack detection
The WIDS attack detection function detects intrusions or attacks on a WLAN network, and informs the
network administrator of the attacks through recording information or sending logs. WIDS detection
supports detection of the following attacks:
•
Flood attack
•
Spoofing attack
•
Weak IV attack
Flood attack detection
A flood attack refers to the case where WLAN devices receive large volumes of frames of the same kind
within a short span of time. When this occurs, the WLAN devices are overwhelmed with frames from this
device and frames from authorized clients get dropped.
WIDS attacks detection counters this flood attack by constantly keeping track of the density of traffic
generated by each device. When this density exceeds the tolerance limit, the device is considered to be
flooding the network. Subsequent frames from this device are not processed. If the dynamic blacklist
feature is enabled, the detected device is added to the blacklist, and is forbidden to access the WLAN
for a period of time.
WIDS detects the following types of frames:
•
Authentication requests and de-authentication requests
•
Association requests, disassociation requests and reassociation requests
•
Probe requests
•
802.11 null data frames
•
802.11 action frames.
Spoofing attack detection
In this kind of attack, a potential attacker can send frames in the air on behalf of another device. For
instance, a client in a WLAN has been associated with an AP and works normally. In this case, a
spoofed de-authentication frame can cause a client to get de-authenticated from the network and can
affect the normal operation of the WLAN.
Содержание WA2612-AGN
Страница 106: ...93 Figure 90 Create a static MAC address entry ...
Страница 126: ...113 Figure 116 Information about an IGMP snooping multicast entry ...
Страница 145: ...132 Enter 10 1 1 2 for Gateway Address c Click Apply Figure 133 Configure a dynamic address pool for the DHCP server ...
Страница 187: ...174 Figure 174 Firefox web browser setting ...
Страница 219: ...206 Figure 202 Common configuration area 6 Configure the advanced parameters ...
Страница 243: ...230 Number of users Real time accounting interval in minutes 500 to 999 12 1000 15 ...
Страница 278: ...265 Figure 266 Network diagram LAN Segment ...
Страница 339: ...326 Figure 348 Configure the wireless card I ...
Страница 340: ...327 Figure 349 Configure the wireless card II ...
Страница 346: ...333 Figure 357 Configure the wireless card II ...