Got it

Huawei Wireless Access Controllers V200R003C00 Web Platform Configuration Guide-Example for Configuring WIDS and WIPS

Latest reply: Jun 26, 2019 07:19:15 2545 2 0 0 0

18.11  Example for Configuring WIDS and WIPS

Networking Requirements

As shown in Figure 18-11, an enterprise connects the AC to the aggregation switch in bypass mode to manage the AP in centralized manner and provide a WLAN with the SSID huawei so that users can access the network anywhere at any time. The enterprise uses WPA2 authentication to authenticate users and CCMP encryption to ensure data security. The AC functions as the DHCP server to assign IP addresses to the APs and STAs.

Due to openness of the WLAN, there are security risks. If attackers deploy an AP with the SSID huawei on the network to forge an authorized AP, STAs may associate with the rogue AP. If wireless terminals attack the WLAN network, for example, the terminals try to crack the WAP2-PSK key or initiate flood attacks to the authorized AP, there are security risks on the network. WIDS and WIPS need to be configured on the AC to detect attacks of rogue APs and terminals.

Figure 18-11  WIDS/WIPS networking 
a0951d36c4284659a1fe4f933b3e9ffa

Data Preparation

ItemData
Working mode of WLAN devices

Hybrid mode

Countermeasure against rogue devices

Counter rogue APs

Attack detection

Flood attack: More than 50 management packets of the same type are received within 60 seconds.

WPA2-PSK brute force password cracking: An incorrect key is entered more than 20 times during WPA2-PSK authentication within 60 seconds.

Aging time of the dynamic blacklist

200 seconds

Configuration Roadmap

The configuration roadmap is as follows:
  1. When the AC provides the WLAN service normally to APs, configure WIDS and WIPS on the ACto detect unauthorized devices and counter rogue APs, disabling STAs from associating with rogue APs. Detect and add attack devices to the dynamic blacklist, so that authorized APs will discard packets from attack devices.
  2. Deliver the configurations to the APs.

Procedure

  1. Configure WIDS and WIPS.
    1. Choose Security Management > WIDS Configuration, click Create, and then click Addfor the Select AP list to add an AP.

      988c6f2b91684455af1c053bfb6b236b

    2. The AP added is displayed in the Select AP list. Click cac0bb3a07e442bfaa15440c10c8673e on the right of the WIDS Configuration page. A configuration page is displayed for you to set parameters on it.
    3. Set thresholds for determining a flood attack and brute force cracking attack and enable the blacklist function.

      139b39dfd6f5444e8dc823072f278db7

    4. Configure the AP to work at 2.4 GHz radio. Enable the attack detection and countermeasure functions and select the types of devices to be detected.

      1bddd80ea5ff48019e76c77100968354

      5db66a72da1b44aa9d4fe2f3ab7aec60 NOTE:
      • To configure WIDS for a dual band AP, click New. The Radio Configuration 2 page is displayed.
      • If the AP works in hybrid mode, services will be interrupted temporarily during periodic scanning, and only the channel used by the WLAN service can be countered. If you want to counter all the channels, set the AP working mode to monitor. At this mode, the WLAN service is unavailable.

    5. Click OK.
  2. Click Commit Configuration in the upper right corner of the page to deliver the configurations to APs.
  3. Verify the configuration.

    Before WIDS and WIPS are configured, STAs associate with the WLAN network with the SSID huawei but connect to a rogue AP. Configure WIDS and WIPS and then verify the configuration.

    After WIDS and WIPS are configured.

    1. Choose Security Management > WIDS Configuration > Rogue Device and set the search criteria to check countered APs.

      820ae9409785469c8ec170564cc2fa56

    2. Click the Attack Records tab page to check detected attack devices. There might be flood attacks on the network and some STAs try to crack WPA2-PSK key.

      e0af58d0c08542859e692d3eef1465d7

    3. Click the Dynamic Blacklist tab page to check attack devices that are automatically added to the dynamic blacklist.

      0654d82e456a486eab245fa57bcc01b6

From group: WLAN

Huawei Wireless Access Controllers V200R003C00 Web Platform Configuration Guide-Example for Configuring WIDS and WIPS
View more
  • x
  • convention:

How to test WIDS/WIPS
View more
  • x
  • convention:

Comment

You need to log in to comment to the post Login | Register
Comment

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."

My Followers

Login and enjoy all the member benefits

Login

Block
Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Reminder
Please bind your phone number to obtain invitation bonus.