Configuration Guide Configuring WIDS
The whitelist includes MAC addresses of admitted STAs. If the whitelist function is enabled, only the listed can access WLAN,
and all packets from other STAs will be directly discarded by the AP, so as to reduce the impact of illegal packets in WLAN.
Static Blacklist
The static blacklist includes MAC address of the denied STAs. If the static blacklist function is enabled, all packets from the
listed STAs will be discarded.
Dynamic Blacklist
The dynamic blacklist includes MAC addresses of the denied STAs. You can configure the dynamic blacklist if DDoS attacks
are detected. For example, add the MAC address of a detected attacker into the blacklist dynamically to forbid receiving any
packet from it, thereby ensuring WLAN security.
SSID-based Whitelist
The SSID-based whitelist includes MAC addresses of the STAs admitted into a specified SSID. You can configure the
SSID-based whitelist. If the SSID-based whitelist function is enabled, only the STAs in the whitelist of the SSID are allowed
access, and all packets from other STAs will be directly discarded by the AP, so as to reduce the impact of illegal packets in
WLAN.
SSID-based Blacklist
The SSID-based blacklist includes MAC addresses of the STAs denied by a specified SSID. You can configure the
SSID-based blacklist. If the SSID-based blacklist function is enabled, all packets from the listed STAs will be discarded by the
AP.
2.3.2 IDS
In order to timely find and defend against malicious or unintentional attacks in WLAN, IDS supports the detection on multiple
attacks. When an attack is detected, an alert or a log will be generated to remind the network administrator of treatment.
Based on detected results, the network administrator can timely adjust network configuration to clear the insecure factors in
WLAN.
Currently, our devices support the following types of IDS attack detection:
DDoS attack detection
Flooding attack detection
Spoofing attack detection
Weak IV detection
Working Principle
DDoS Attack Detection
DDoS attack means that the attackers send a large number of attack packets toward targeted devices in a short period of
time (ARP packets, ICMP packets and SYN packets identified currently) so as to affect legal STAs being associated with the
attacked device.