Specifications

Intrusion Detection Configuration 305
CHAPTER 15
Intrusion Detection Configuration
This chapter discusses the various kinds of intrusion and
Wireless LAN attack methods. It also describes how to configure
the switch to detect and guard against the various kinds of
intrusion attempts.
AOS-W protects against numerous types of intrusion methods
and tools, including:
z Probing and Network Discovery
z Denial of Service (DoS)
z Surveillance
z Impersonation
z Client Intrusion
z Network Intrusion
Wireless LAN Intrusion Detection
The nature of wireless networks makes them attractive targets
for intruders. Many intruders are only searching for free Internet
access, and use a number of different probe tools to find it.
Others, however, are intent on gaining access to an enterprise
network for malicious purposes – either to steal data, disrupt
legitimate communication, or damage data. Wireless LAN
intrusion can be classified into several broad categories:
z Probing and Network Discovery