To select a specific countermeasure:
Countermeasures are enabled on a per-scan-profile basis. Some scan profiles can have countermeasures enabled while others cannot.
Field/Button | Description |
---|---|
Countermeasures | |
Prevent authorized stations from roaming to external honeypot APs | An external honeypot is an AP that is attempting to make itself a man-in-the-middle by advertising a popular SSID, such as an SSID advertised by a coffee shop or an airport |
Prevent authorized stations from roaming to friendly APs | Friendly APs are APs that are not part of the authorized wireless network, but they operate in the vicinity of the authorized wireless network. |
Prevent any station from using an internal honeypot AP | An internal honeypot is an AP that is attempting to make itself a man-in-the-middle by advertising an SSID belonging to the authorized wireless network. |
Prevent any station from using a rogue AP | A rogue AP is an unauthorized AP connected to the authorized wired or wireless network. |
Prevent any station from using a spoofed AP | A spoofed AP s an AP that is not part of the authorized network is advertising a BSSID (MAC address) that belongs to an authorized AP on the authorized network. |
Drop frames in a controlled fashion during a flood attack | Prevents some types of Denial of Service (DoS) attack from affecting the authorized network instead of just the target AP. For example, rate limiting the flooded frames. |
Prevent any station from using an ad hoc mode device | Deauthentication messages are used to prevent devices from using an ad hoc mode device. |
Remove network access from clients originating DoS and password-cracking attacks | Prevents propagation of the DoS attack from the
AP to the authorized network. Many types of DoS attack involve
deluging an AP with a large volume of messages of one or two specific
types. When this option is enabled, the AP will apply rate limits to
the specific type of frame that is being deluged. The selected clients for this countermeasure are denied access to the network for the amount of time that is specified in " Remove network access from violating clients for a period of time." |
Remove network access from violating clients for a period of time | Enter a numeric value in seconds. |
Defense Options | |
Maximum number of channels per radio to defend concurrently | Click the slider to select the number of channels desired. |
New | Click to create a new Guardian scan profile. For more information, click Adding a New Scan Profile. |
Delete | Click to delete the selected Guardian scan profile. |
Save | Click to save changes. |