Motorola WS5100 manual 6.3MU Intrusion Detection, 6.3.1Configuring MU Intrusion Detection

Models: WS5100

1 364
Download 364 pages 29.43 Kb
Page 233
Image 233

Switch Security 6-9

3. The Unapproved APs (Reported by MUs) table displays the following information:

BSS MAC Address

Displays the MAC Address of each Unapproved AP. These MAC Addresses are access points

 

observed on the network (by associated MUs), but have yet to be added to the list of

 

Approved APs, and are therefore interpreted as a threat on the network.

Reporting MU

Displays the numerical value for the detecting MU.

Last Seen (In

Displays the time (in seconds) the Unapproved AP was last seen on the network by the

Seconds)

detecting MU. Use this interval to determine whether the detected MU is still a viable threat.

ESSID

Displays the ESSID of each Unapproved AP. These ESSIDs are device ESSIDs observed on the

 

network, but have yet to be added to the list of Approved APs and are therefore interpreted

 

as a threat.

4.The Number of Unapproved APs is simply the sum of all of Unapproved Radio MAC Addresses detected.

5.Click the Export button to export the contents of the table to a Comma Separated Values file (CSV).

6.3MU Intrusion Detection

Unauthorized attempts to access the switch managed LAN by MUs is a significant threat to the network. The switch can protect against threats from MUs trying to find network vulnerabilities. Basic forms of this behavior can be monitored and reported.

Use the Mobile Unit Intrusion Detection sub-menu to view and configure MU intrusion related information. The Mobile Unit Intrusion Detection screen consists of the following tabs:

Configuring MU Intrusion Detection

Viewing Filtered MUs

6.3.1Configuring MU Intrusion Detection

To configure MU intrusion detection:

1.Select Security > Mobile Unit Intrusion Detection from the main tree menu.

Page 233
Image 233
Motorola WS5100 6.3MU Intrusion Detection, 6.3.1Configuring MU Intrusion Detection, •Configuring MU Intrusion Detection