Configuring IDS Parameters on APs

Classic Central supports the IDS Intrusion Detection System. IDS monitors a network or systems for malicious activity or policy violations and reports its findings to the management system deployed in the network. feature that monitors the network for the presence of unauthorized APs and clients. It also logs information about the unauthorized APs and clients, and generates reports based on the logged information.

Rogue APs

The IDS feature in the Classic Central network enables you to detect rogue APs, interfering APs, and other devices that can potentially disrupt network operations. A rogue AP is an unauthorized AP plugged into the wired side of the network. An interfering AP is an AP seen in the RF Radio Frequency. RF refers to the electromagnetic wave frequencies within a range of 3 kHz to 300 GHz, including the frequencies used for communications or Radar signals. environment, but it is not connected to the wired network. While the interfering AP can potentially cause RF interference, it is not considered a direct security threat, because it is not connected to the wired network. However, an interfering AP may be reclassified as a rogue AP.

The built-in IDS scans for APs that are not controlled by the VC. These are listed and classified as either Interfering or Rogue, depending on whether they are on a foreign network or your network.

Configuring Wireless Intrusion Detection and Protection Policies

To configure a Wireless Intrusion Detection and Protection policy:

  1. In the WebUI, set the filter to a group that contains at least one AP.
    The dashboard context for the group is displayed.
  2. Under Manage, click Devices > Access Points.
  3. Click the Config icon. The tabs to configure access points is displayed.
  4. Click Show Advanced.
  5. Click Security. The Security details page is displayed.
  6. Click the Wireless IDS/IPS accordion.

    The following three sections are displayed:

    • Detection
    • Protection

    You can configure the following options in the above mentioned sections:

    • Infrastructure Detection Policies—Specifies the policy for detecting wireless attacks on APs.
    • Client Detection Policies—Specifies the policy for detecting wireless attacks on clients.
    • Infrastructure Protection Policies—Specifies the policy for protecting APs from wireless attacks.
    • Client Protection Policies—Specifies the policy for protecting clients from wireless attacks.
    • Containment Methods—Prevents unauthorized stations from connecting to your Classic Central network.

    Each of these options contains several default levels that enable different sets of policies. An administrator can customize enable or disable these options accordingly.

Detection

The detection levels can be configured using the Detection section. The following levels of detection can be configured in the WIP Wireless Intrusion Protection. The WIP module provides wired and wireless AP detection, classification, and containment. It detects Denial of Service (DoS) and impersonation attacks, and prevents client and network intrusions. Detection page:

Protection

The following levels of protection can be configured in the WIP Protection page:

  • Off
  • Low
  • High
  • Custom

The following table describes the protection policies that are enabled in the Infrastructure Protection field.

Table 3: Infrastructure Protection Policies

Protection level

Protection policy

High

  • Protect SSID—Enforces policy where the valid/protected SSIDs are used only by valid APs. An offending AP is contained by preventing clients from associating to it.
  • Rogue Containment—Controls Rogue APs. When rogue APs are detected, they are not automatically disabled. This option automatically disables a rogue AP by preventing clients from associating to it.
  • Protect AP Impersonation—Enables protection from AP impersonation attacks. When AP impersonation is detected, both the legitimate and impersonating AP are disabled using a Denial of Service (DoS).
  • Protect from Adhoc Networks—Enables protection from adhoc networks. When adhoc networks are detected, they are disabled using a denial of service attack.

Low

  • Protect SSID—Enforces policy where the valid/protected SSIDs are used only by valid APs. An offending AP is contained by preventing clients from associating to it.
  • Rogue Containment—Controls Rogue APs. When rogue APs are detected, they are not automatically disabled. This option automatically disables a rogue AP by preventing clients from associating to it.

Off

All protection policies are disabled

Custom

Allows you to select custom protection policies. To select, click the check box of respective protection policy.

The following table describes the protection policies that are enabled in the Client Protection field.

Table 4: Client Protection Policies

Protection level

Protection policy

High

  • Protect Valid Station—Enables protection of valid stations. When enabled valid stations are not allowed to connect to an invalid AP.
  • Protect Windows Bridge—Enables protection of a Windows station bridging.

Low

Protect Valid Station—Enables protection of valid stations. When enabled valid stations are not allowed to connect to an invalid AP.

Off

All protection policies are disabled

Custom

Allows you to select custom protection policies. To select, click the check box of respective protection policy.

Containment Methods

You can enable wired and wireless containment measures to prevent unauthorized stations from connecting to your Classic Central network.

Classic Central supports the following types of containment mechanisms:

Protection Against Wired Attacks

In the Protection Against Wired Attacks section, enable the following options: