Configuration Guide Configuring WIDS
2 Configuring WIDS
2.1 Overview
Compared with wired networks, Wireless LAN (WLAN) has unparalleled advantages, such as convenient deployment,
flexible use, efficient cost, and easy extension, making it more and more prevalent. However, for the openness of its
channels, WLAN is much vulnerable to various network threats, such as rogue access points (APs), Ad-hoc networks, and all
types of protocol attacks. Therefore, security becomes a major factor that hinders WLAN development.
Wireless Intrusion Detection System (WIDS) detects vicious STA attacks and invasions in the early stage, which helps
network administrators actively observe and defend against the hidden dangers in networks in the first time.
2.2 Applications
N/A
2.3 Features
Basic Concepts
Working Modes
The WIDS has the following working modes:
Normal mode, providing only the access service
Monitor mode, providing only the monitoring service
Hybrid mode, providing both monitoring and access services
IDS Detection Types
The IDS attack detection has the following five types:
DDoS attack detection, detecting DDoS attacks involving ARP, ICMP and SYN packets
Flooding attack detection, detecting the flooding attacks involving single-user or multi-user management packets
Spoofing attack detection, detecting the broadcast disassociation and deauthentication attacks
Weak IV attack detection, detecting weak vector attacks
User Isolation Modes
The user isolation has the following two modes: