Management and Monitoring
92
ProSafe Premium 3 x 3 Dual-Band Wireless-N Access Point WNDAP620
RF jamming attack Attack. Multiple RF transmissions (100 or more) are sent to the
wireless access point, jamming the radio frequency.
Result. Wireless service is disrupted.
Note: The IDS detects this attack, but the IPS does not take action
against this attack.
100 Trap
Virtual carrier attack Attack. Multiple frames (60 or more) with a large duration value
are sent to the wireless access point.
Result. Wireless service is disrupted.
Solution. The wireless access point sends a channel change
frame to the legitimate clients and uses automatic channel
selection to switch to a new clear channel.
60 Trap
MAC spoofing Attack. Several frames (3 or more) that contain the spoofed
MAC address of the wireless access point itself or the spoofed
MAC address of a legitimate client are sent to the wireless
access point.
Result. Wireless security might be compromised.
Note: The IDS detects MAC spoofing, but the IPS does not take
action against MAC spoofing.
3Trap
Rogue AP detection Detection. A wireless access point is not in the managed AP
list (see View and Save Access Point Lists on page 87) and is
not connected to the secured wireless or wired network.
Result. Wireless security might be compromised.
Note: The IDS detects rogue APs, but the IPS does not take action
against rogue APs. For information about how to exclude rogue APs
from your network, see Enable Rogue AP Detection and Monitor
Access Points on page 85.
0Trap
Ad-hoc network
detected Detection. A group of wireless access points are part of an
ad hoc network that might broadcast the same SSID as the
secured wireless network.
Result. Wireless security might be compromised.
Note: The IDS detects ad hoc networks, but the IPS does not take
action against ad hoc networks.
0Trap
Ad-hoc network with
wired connectivity D etection. A group of wireless access points are part of an
ad hoc network that has a wired connection and that might
broadcast the same SSID as the secured wireless network.
Result. Wireless security might be compromised.
Note: The IDS detects ad hoc networks, but the IPS does not take
action against ad hoc networks.
0Trap
Table 24. IDS/IPS policies and policy rules (continued)
Policy Description Policy Rule
Threshold Notification