Rogue Detection and Countermeasures 543

Table 33: Rogue Detection Features (continued)

Rogue Detection

 

Applies To

 

Description

 

 

Third-Party

 

Feature

Clients

 

 

 

APs

 

 

 

 

 

 

 

Ignore list

List of MAC addresses to ignore

Yes

Yes

 

during RF detection. WSS Software

 

 

 

does not classify devices on this list as

 

 

 

rogues or interfering devices, and does

 

 

 

not issue countermeasures against

 

 

 

them.

 

 

 

 

 

 

Countermeasures

Packets sent by Nortel APs to interfere

Yes

Yes

 

with the operation of a rogue.

 

 

 

Countermeasures are configurable a

 

 

 

radio-profile basis.

 

 

 

 

 

 

Active scan

Active scan sends probe any requests

Yes

No

 

(probes with a null SSID name) to look

 

 

 

for rogue APs.

 

 

 

Active scan is configurable on a

 

 

 

radio-profile basis.

 

 

 

 

 

 

Nortel AP signature

Value in an AP’s management frames

No

No

 

that identifies the AP to WSS

 

 

 

Software. AP signatures help prevent

 

 

 

spoofing of the AP MAC address.

 

 

 

 

 

 

Log messages and

Messages and traps for rogue activity.

Yes

Yes

traps

Messages are described in “IDS and

 

 

 

DoS Alerts” on page 550.

 

 

 

 

 

 

Configuring Rogue Detection Lists

The following sections describe how to configure lists to specify the devices that are allowed on the network and the devices that WSS Software should attack with countermeasures.

(For information about how WSS Software uses the lists, see “Rogue Detection Lists” on page 538.)

Nortel WLAN Security Switch 2300 Series Configuration Guide

Page 543
Image 543
Nortel Networks 2300 manual Configuring Rogue Detection Lists