425 
WLAN security configuration 
WLAN security overview 
802.11 networks are susceptible to a wide array of threats such as unauthorized access points and clients, 
ad hoc networks, and Denial of Service (DoS) attacks. To ensure security, the wireless intrusion detection 
system (WIDS) is introduced. WIDS provides early detection of malicious attacks and intrusions on a 
wireless network without affecting network performance, and provides real-time countermeasures.  
WLAN security provides these features: 
•  WIDS attack detection 
•  Blacklist and white list 
WIDS attack detection 
The WIDS attack detection function detects intrusions or attacks on a WLAN network, and informs the 
network administrator of the attacks through recording information or sending logs. WIDS detection 
supports detection of the following attacks: 
•  Flood attack 
•  Spoofing attack 
•  Weak IV attack 
Flood attack detection 
A flood attack refers to the case where WLAN devices receive large volumes of frames of the same kind 
within a short span of time. When this occurs, the WLAN devices are overwhelmed with frames from this 
device and frames from authorized clients get dropped. 
WIDS attacks detection counters this flood attack by constantly keeping track of the density of traffic 
generated by each device. When this density exceeds the tolerance limit, the device is considered to be 
flooding the network. Subsequent frames from this device are not processed. If the dynamic blacklist 
feature is enabled, the detected device is added to the blacklist, and is forbidden to access the WLAN 
for a period of time. 
WIDS detects the following types of frames: 
•  Authentication requests and de-authentication requests 
•  Association requests, disassociation requests and reassociation requests 
•  Probe requests 
•  802.11 null data frames 
•  802.11 action frames. 
Spoofing attack detection 
In this kind of attack, a potential attacker can send frames in the air on behalf of another device. For 
instance, a client in a WLAN has been associated with an AP and works normally. In this case, a 
spoofed de-authentication frame can cause a client to get de-authenticated from the network and can 
affect the normal operation of the WLAN.