User Guide
Intrusion Detection 173
Chapter 13
1. To configure AP impersonation detection, click the
AP Impersonation.
The following table gives a brief description of the fields in this section.
Configuring Signature Detection
Navigate to the Configuration > Wireless LAN Intrusion Detection > Signatures page
on the WebUI on the Master switch.
4. Sequence Number Checking
Quiet Time (secs)
After an alarm has been triggered, the
amount of time that must pass before
another identical alarm may be
triggered.
Field Description
1. Enable AP Impersonation
Detection
Enables detection of AP
impersonation.
2. Enable AP Impersonation
Protection
When AP impersonation is detected,
both the legitimate and the
impersonating AP will be disabled
using a denial of service attack.
3. Beacon Rate Increment
Threshold
The percentage increase in beacon
rate that will trigger an AP
impersonation event.










