
5-72
Cisco Wireless LAN Controller Configuration Guide
OL-13826-01
Chapter 5 Configuring Security Solutions
Configuring IDS
This page shows much of the same information as the Standard Signatures and Custom Signatures pages
but provides these additional details:
• The measurement interval, or the number of seconds that must elapse before the controller resets the
signature threshold counters
• The tracking method used by the access points to perform signature analysis and report the results
to the controller. The possible values are:
–
Per Signature—Signature analysis and pattern matching are tracked and reported on a
per-signature and per-channel basis.
–
Per MAC—Signature analysis and pattern matching are tracked and reported separately for
individual client MAC addresses on a per-channel basis.
–
Per Signature and MAC—Signature analysis and pattern matching are tracked and reported on
a per-signature and per-channel basis as well as on a per-MAC-address and per-channel basis.
• The signature frequency, or the number of matching packets per second that must be identified at
the individual access point level before an attack is detected
• The signature MAC frequency, or the number of matching packets per second that must be identified
per client per access point before an attack is detected
• The quiet time, or the length of time (in seconds) after which no attacks have been detected at the
individual access point level and the alarm can stop
• The pattern that is being used to detect a security attack
Step 5 Check the State check box to enable this signature to detect security attacks or uncheck it to disable this
signature. The default value is enabled (or checked).
Step 6 Click Apply to commit your changes. The Standard Signatures or Custom Signatures page reflects the
signature’s updated state.
Step 7 Click Save Configuration to save your changes.
Using the GUI to View IDS Signature Events
Follow these steps to view signature events using the controller GUI.
Step 1 Click Security > Wireless Protection Policies > Signature Events Summary. The Signature Events
Summary page appears (see Figure 5-41).
Figure 5-41 Signature Events Summary Page
This page shows the number of attacks detected by the enabled signatures.
Komentáře k této Příručce