Configuring Security and Other Services
Configuring Wireless Intrusion Prevention
Figure 50.
Configuring Wireless Intrusion Prevention
ZoneDirector has built-in intrusion prevention features called WIPS (Wireless Intrusion Preven-
tion System) to protect the wireless network from security threats such as DoS attacks and
intrusion attempts.
To configure the intrusion prevention options
1. Go to Configure > WIPS.
2. In the Denial of Service (DoS) section, configure the following settings:
•
Protect my wireless network against excessive wireless requests: If this capability is
activated, excessive 802.11 probe request frames and management frames launched
by malicious attackers will be discarded.
•
Temporarily block wireless clients with repeated authentication failures for [ ]
seconds: If this capability is activated, any clients that repeatedly fail in attempting
authentication will be temporarily blocked for a period of time (10~1200 seconds,
default is 30). Clients temporarily blocked by the Intrusion Prevention feature are not
added to the Blocked Clients list under Monitor > Access Control.
3. In the Intrusion Detection and Prevention section, configure the following settings:
•
Report rogue devices: Enabling this check box allows ZoneDirector to include rogue
device detection in logs and email alarm event notifications.
•
Protect the network from malicious rogue access points: Enable this feature to
automatically protect your network from network connected rogue APs, SSID-spoofing
APs and MAC-spoofing APs. When one of these rogue APs is detected (and this check
Packet Inspection Filter
74
Need help?
Do you have a question about the ZoneDirector 1100 and is the answer not in the manual?
Questions and answers