Specifications
Intrusion Detection Configuration 311
Chapter 15
To configure detection of FakeAP, navigate to
Configuration > Wireless LAN
Intrusion Detection > Denial of Service > FakeAP
as shown in the figure below.
FIGURE 15-3 FakeAP Detection
Configuration parameters are:
Enable Fake AP Flood Detection – Enables or disables the feature.
Flood Inc Time – The time period in which a configured number of FakeAP
beacons must be received.
Flood Threshold – The number of FakeAP beacons that must be received
within the Flood Inc Time in order to trigger an alarm.
Quiet Time – After an alarm has been triggered, the amount of time that must
pass before another identical alarm may be triggered.
The equivalent CLI configuration for the above example is:
wms
ids-policy ap-flood-check disable
ids-policy ap-flood-threshold 50
ids-policy ap-flood-inc-time 3
ids-policy ap-flood-quiet-time 900
Man-in-the-Middle
A successful man-in-the-middle attack will insert an attacker into the data
path between the client and the AP. In such a position, the attacker can
delete, add, or modify data, provided he has access to the encryption keys.