To configure a WIPS policy:
WIPS Policy | Displays the name assigned to the WIPS policy when it was initially created. The name cannot be modified as part of the edit process. |
Status | Displays a green check mark if the listed WIPS policy is enabled and ready for use with a profile. A red “X” designates the listed WIPS policy as disabled. |
Interval to Throttle Duplicates | Displays the duration when event duplicates (redundant events) are not stored in event history. |
If you are adding or editing an existing WIPS policy, the WIPS Policy screen displays with the Settings tab displayed by default.
Enable Rogue AP Detection | Select the check box to enable the detection of unauthorized (unsanctioned) devices for this WIPS policy. The default setting is Disabled. |
Wait Time to Determine AP Status | Define a wait time in either seconds (10 - 600) or minutes (1 - 10) before a detected AP is interpreted as a rogue (unsanctioned) device, and potentially removed. The default interval is 1 minute. |
Ageout for AP Entries | Set the interval the WIPS policy uses to age out rogue devices. Set the policy in either seconds (30 - 86,400), minutes (1- 1,440), hours (1 - 24) or days (1). The default setting is 5 minutes. |
Interferer Threshold | Specify an RSSI threshold (from -100 to -10 dBm) after which a detected access point is classified as an interferer (rogue device). |
Recurring Event Interval | Set an interval that, when exceeded, duplicates a rogue AP event if the rogue devices is still active (detected) in the network. The default setting is 5 minutes. |
Air Termination | Select this option to enable the termination of detected rogue AP devices. Air termination lets you terminate the connection between your wireless LAN and any access point or client associated with it. If the device is an access point, all clients dis-associated with the access point. If the device is a client, its connection with the access point is terminated. This setting is disabled by default. |
Air Termination Channel Switch | Select this option to allow neighboring access points to switch channels for rogue AP termination. This setting is disabled by default. |
Air Termination Mode | If termination is enabled, use the drop-down menu to specify the termination mode used on detected rogue devices. The default setting is manual. |
If a policy requires creation, select Create. If an existing policy requires modification, select Edit and update the device categorization policy as needed.
The Excessive tab lists a series of events that can impact the performance of the network. An administrator can enable or disable the filtering of each listed event and set the thresholds required for the generation of the event notification and filtering action.
An Excessive Action Event is an event where an action is performed repetitively and continuously. DoS attacks come under this category. Use the Excessive Action Events table to select and configure the action taken when events are triggered.
AP events can be globally enabled and disabled as required using the Enable All and Disable All buttons on the top-right-hand side of the screen.Name | Displays the name of the excessive action event representing a potential threat to the network. This column lists the event being tracked against the defined thresholds set for interpreting the event as excessive or permitted. |
Enable | Displays whether tracking is enabled for each Excessive Action Event. Use the drop-down menu to enable/disable events as required. A green check mark defines the event as enabled for tracking against its threshold values. A red “X” defines the event as disabled and not tracked by the WIPS policy. Each event is disabled by default. Events can be globally enabled and disabled as required using the Enable All and Disable All buttons on the top-right-hand side of the screen. |
Filter Expiration | Set the duration the anomaly
causing client is filtered. This creates a special ACL entry
and frames coming from the client are silently dropped. The
default setting is 0 seconds. This value is applicable across the RF Domain. If a station is detected performing an attack and is filtered by one of the APs, the information is passed to the domain controller or service platform. The domain controller or service platform then propagates this information to all APs in the RF Domain. |
Client Threshold | Set the client threshold after which the filter is triggered and an event generated. |
Radio Threshold | Set the radio threshold after which an event is recorded to the events history. |
MU anomaly events are suspicious events by wireless clients that can compromise the security and stability of the network. Use this MU anomaly screen to configure the intervals clients can be filtered upon the generation of each defined event.
MU events can be globally enabled and disabled as required using the Enable All and Disable All buttons on the top-right-hand side of the screen.
Name | Displays the name of the MU anomaly event representing a potential threat to the network. This column lists the event being tracked against the defined thresholds set for interpreting the event as excessive or permitted. |
Enable | Displays whether tracking is enabled for each event. Use the drop-down menu to enable/disable events as required. A green check mark defines the event as enabled for tracking against its threshold values. A red “X” defines the event as disabled and not tracked by the WIPS policy. Each event is disabled by default. MU events can be globally enabled and disabled as required using the Enable All and Disable All buttons on the top-right-hand side of the screen. |
Filter Expiration | Set the duration the anomaly causing client is filtered. This creates a special ACL entry and frames coming from the client are silently dropped. The default setting is 0 seconds. For each violation, define a time to filter value in seconds which determines how long received packets are ignored from an attacking device once a violation has been triggered. Ignoring frames from an attacking device minimizes the effectiveness of the attack and the impact to the site until permanent mitigation can be performed. |
AP anomaly events are suspicious frames sent by a neighboring APs. Use this screen to determine whether an event is enabled for tracking.
AP events can be globally enabled and disabled as required using the Enable All and Disable All buttons on the top-right-hand side of the screen.
Name | Displays the name of the AP anomaly event representing a potential threat to the network. This column lists the event being tracked against the defined thresholds set for interpreting the event as excessive or permitted. |
Enable | Displays whether tracking is enabled for each AP anomaly event. Use the drop-down menu to enable/disable events as required. A green check mark defines the event as enabled for tracking against its threshold values. A red “X” defines the event as disabled and not tracked by the WIPS policy. Each event is disabled by default. AP events can be globally enabled and disabled as required using the Enable All and Disable All buttons on the top-right-hand side of the screen. |
Name | Lists the name (in the top left-hand corner) assigned to each signature when it was created. A signature name cannot be modified as part of the edit process. |
Signature | Displays whether the signature is enabled. A green check mark defines the signature as enabled. A red “X” defines the signature as disabled. Each signature is disabled by default. |
BSSID MAC | Displays each BSS ID MAC address used for matching purposes and potential device exclusion. |
Source MAC | Displays each source MAC address of the packet examined for matching purposes and potential device exclusion. |
Destination MAC | Displays each destination MAC address of the packet examined for matching purposes and potential device exclusion. |
Frame Type to Match | Lists the frame types specified for matching with the WIPS signature. |
Match on SSID | Lists each SSID used for matching purposes. |
Enable Signature | Select the check box to enable the WIPS signature for use with the profile. The default signature is enabled. |
BSSID MAC | Define a BSS ID MAC address used for matching and filtering with the signature. |
Source MAC | Define a source MAC address for packets examined for matching, filtering and potential device exclusion using the signature. |
Destination MAC | Set a destination MAC address for the packet examined for matching, filtering and potential device exclusion with the signature. |
Frame Type to Match | Use the drop-down menu to select a frame type for matching and filtering with the WIPS signature. |
Match on SSID | Set the SSID used for matching and filtering with the signature. Ensure that it is specified properly, or the SSID will not be properly filtered. |
SSID Length | Set the character length of the SSID used for matching and filtering with this signature. The maximum length is 32 characters. |
Wireless Client Threshold | Specify the threshold limit per client that, when exceeded, signals the event. The configurable range is from 1 - 65,535. |
Radio Threshold | Specify the threshold limit per radio that, when exceeded, signals the event. The configurable range is from 1 - 65,535. |