Intrusion Detection Deployment Considerations
Before configuring WIPS support on a controller, service
platform or access point, refer to the following deployment guidelines to ensure the
configuration is optimally effective:
- WIPS is best utilized when deployed in conjunction with a
corporate or enterprise wireless security policy. Since an organization's security
goals vary, the security policy should document site specific concerns. The WIPS
system can then be modified to support and enforce these additional security
policies
- WIPS reporting tools can minimize administration time.
Vulnerability and activity reports should automatically run and be distributed to the
appropriate administrators. These reports should highlight areas to be investigated
and minimize the need for network monitoring.
- It is important to keep your WIPS system firmware and software
up to date. A quarterly system audit can ensure firmware and software versions are
current.
- Only a trained wireless network administrator can determine the
criteria used to authorize or ignore devices. You may want to consider your
organization's overall security policy and your tolerance for risk versus users' need
for network access. Some questions that may be useful in deciding how to classify a
device are:
- Does the device conform to any vendor requirements you
have?
- What is the signal strength of the device? Is it likely
the device is outside your physical radio coverage area?
- Is the detected access point properly configured according
to your organization‘s security policies?
- Controller or service platform visibility to all deployed VLANs is recommended. If
an external L3 device has been deployed for routing services, each VLAN should be
802.1Q tagged to the controller or service platform to allow the detection any
unsanctioned APs physically connected to the network.
- Trusted and known access points should be added to an sanctioned
AP list. This will minimize the number of unsanctioned AP alarms received.