D-Link DWS-4026 Руководство пользователя. Версия 2.0 онлайн [617/741] 172936

D-Link DWS-4026 Руководство пользователя. Версия 2.0 онлайн [617/741] 172936
ConfiguringAdvancedSettings
D-Link UnifiedWiredandWirelessAccessSystem
November2011 Page617
DLinkUWSUserManual
Table360showsthefieldsontheWIDSSecurityAPConfigurationpage.
Table360:WIDSAPConfiguration
Field Description
Administratorconfigured
rogueAP
IfthesourceMACaddressisinthevalidAPdatabaseontheswitchoronthe
RADIUSserverandtheAPtypeismarkedasRogue,thentheAPstateis
Rogue.
ManagedSSIDfroman
unknownAP
ThistestcheckswhetheranunknownAPisusingthema
nagednetworkSSID.
AhackermaysetupanAPwithmanagedSSIDtofoolusersintoassociating
withtheAPandrevealingpasswordandothersecureinformation.
Administratorswithlargenetworkswhoareusingmultipleclustersshould
eitherusedifferentnetworknamesineachclusterordisablethistest.
Other
wise,ifanAPinthefirstclusterdetectsAPsinthesecondcluster
transmittingthesameSSIDasAPsinthefirstclusterthentheseAPsare
reportedasrogues.
ManagedSSIDfromafake
managedAP
AhackermaysetupanAPwiththesameMACaddressasoneofthemanag
ed
APsandconfigureittosendoneofthemanagedSSIDs.Thistestchecksfora
vendorfieldinthebeaconswhichisalwaystransmittedbymanagedAPs.If
thevendorfieldisnotpresent,thentheAPisidentifiedasafakeAP.
APwithoutanSS
ID SSIDisanoptionalfieldinbeaconframes.Toavoiddetectionahackermayset
upanAPwiththemanagednetworkSSID,butdisableSSIDtransmissionin
thebeaconframes.TheAPwouldstillsendproberesponsestoclientsthat
sendproberequestsforthemanagedSSIDfoolingtheclien
tsintoassociating
withthehacker'sAP.
ThistestdetectsandflagsAPsthattransmitbeaconswithouttheSSIDfield.
Thetestisautomaticallydisabledifanyoftheradiosintheprofilesare
configurednottosendSSIDfield,whichisnotrecommendedbecauseitdoes
notprovideanyrealsecurityanddisabl
esthistest.
FakemanagedAPonaninvalid
channel
ThistestdetectsrogueAPsthattransmitbeaconsfromthesourceMAC
addressofoneofthemanagedAPs,butondifferentchannelfromwhichthe
APissupposedtobeoperating.
ManagedSSIDdetectedwith
incorrectsecurity
DuringRFSc
antheAPexaminesbeaconframesreceivedfr omotherAPsand
determineswhetherthedetectedAPisadvertisinganopennetwork,WEP,or
WPA.
IftheSSIDreportedintheRFScanisoneofthemanagednetworksandits
configuredsecuritynotmatchthedetectedsecuritythenthistestmarksthe
APasro
gue.
InvalidSSIDfromamanaged
AP
ThistestcheckswhetheraknownmanagedAPissendinganunexpectedSSID.
TheSSIDreportedintheRFScaniscomparedtothelistofallconfiguredSSIDs
thatareusedbytheprofileassignedtothemanagedAP.Ifth
edetectedSSID
doesn'tmatchanyconfiguredSSIDthentheAPismarkedasrogue.
APisoperatingonanillegal
channel
Thepurposeofthistestistodet ecthackersorincorrectlyconfigureddevices
thatareoperatingonchannelsthatarenotlegalinthecountrywherethe
wirelesssystemisse
tup.
Note:Inorderforthewirelesssystemtodetectthisthreat,thewireless
networkmustcontainoneormoreradiosthatoperateinsentrymode.

Содержание

Похожие устройства

Скачать