EasyManuals Logo

H3C WA Series User Manual

H3C WA Series
447 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #438 background imageLoading...
Page #438 background image
425
WLAN security configuration
WLAN security overview
802.11 networks are susceptible to a wide array of threats such as unauthorized access points and clients,
ad hoc networks, and Denial of Service (DoS) attacks. To ensure security, the wireless intrusion detection
system (WIDS) is introduced. WIDS provides early detection of malicious attacks and intrusions on a
wireless network without affecting network performance, and provides real-time countermeasures.
WLAN security provides these features:
• WIDS attack detection
• Blacklist and white list
WIDS attack detection
The WIDS attack detection function detects intrusions or attacks on a WLAN network, and informs the
network administrator of the attacks through recording information or sending logs. WIDS detection
supports detection of the following attacks:
• Flood attack
• Spoofing attack
• Weak IV attack
Flood attack detection
A flood attack refers to the case where WLAN devices receive large volumes of frames of the same kind
within a short span of time. When this occurs, the WLAN devices are overwhelmed with frames from this
device and frames from authorized clients get dropped.
WIDS attacks detection counters this flood attack by constantly keeping track of the density of traffic
generated by each device. When this density exceeds the tolerance limit, the device is considered to be
flooding the network. Subsequent frames from this device are not processed. If the dynamic blacklist
feature is enabled, the detected device is added to the blacklist, and is forbidden to access the WLAN
for a period of time.
WIDS detects the following types of frames:
• Authentication requests and de-authentication requests
• Association requests, disassociation requests and reassociation requests
• Probe requests
• 802.11 null data frames
• 802.11 action frames.
Spoofing attack detection
In this kind of attack, a potential attacker can send frames in the air on behalf of another device. For
instance, a client in a WLAN has been associated with an AP and works normally. In this case, a
spoofed de-authentication frame can cause a client to get de-authenticated from the network and can
affect the normal operation of the WLAN.

Table of Contents

Other manuals for H3C WA Series

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the H3C WA Series and is the answer not in the manual?

H3C WA Series Specifications

General IconGeneral
BrandH3C
ModelWA Series
CategoryWireless Access Point
LanguageEnglish

Related product manuals