Cisco Cisco Access Registrar 4.2 Specifikace Strana 256

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 636
  • Tabulka s obsahem
  • ŘEŠENÍ PROBLÉMŮ
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 255
5-72
Cisco Wireless LAN Controller Configuration Guide
OL-13826-01
Chapter 5 Configuring Security Solutions
Configuring IDS
This page shows much of the same information as the Standard Signatures and Custom Signatures pages
but provides these additional details:
The measurement interval, or the number of seconds that must elapse before the controller resets the
signature threshold counters
The tracking method used by the access points to perform signature analysis and report the results
to the controller. The possible values are:
Per Signature—Signature analysis and pattern matching are tracked and reported on a
per-signature and per-channel basis.
Per MAC—Signature analysis and pattern matching are tracked and reported separately for
individual client MAC addresses on a per-channel basis.
Per Signature and MAC—Signature analysis and pattern matching are tracked and reported on
a per-signature and per-channel basis as well as on a per-MAC-address and per-channel basis.
The signature frequency, or the number of matching packets per second that must be identified at
the individual access point level before an attack is detected
The signature MAC frequency, or the number of matching packets per second that must be identified
per client per access point before an attack is detected
The quiet time, or the length of time (in seconds) after which no attacks have been detected at the
individual access point level and the alarm can stop
The pattern that is being used to detect a security attack
Step 5 Check the State check box to enable this signature to detect security attacks or uncheck it to disable this
signature. The default value is enabled (or checked).
Step 6 Click Apply to commit your changes. The Standard Signatures or Custom Signatures page reflects the
signature’s updated state.
Step 7 Click Save Configuration to save your changes.
Using the GUI to View IDS Signature Events
Follow these steps to view signature events using the controller GUI.
Step 1 Click Security > Wireless Protection Policies > Signature Events Summary. The Signature Events
Summary page appears (see Figure 5-41).
Figure 5-41 Signature Events Summary Page
This page shows the number of attacks detected by the enabled signatures.
Zobrazit stránku 255
1 2 ... 251 252 253 254 255 256 257 258 259 260 261 ... 635 636

Komentáře k této Příručce

Žádné komentáře