Users Guide

Table Of Contents
Dell Networking W-Series ArubaOS 6.4.x| User Guide Wireless Intrusion Prevention | 532
Chapter 21
Wireless Intrusion Prevention
The ArubaOS Wireless Intrusion Prevention (WIP) features and configurations are discussed in this chapter.
WIP offers a wide selection of intrusion detection and protection features to protect the network against
wireless threats. Like most other security-related features of the Dell network, the WIP configuration is done
on the master controller in the network.
To use most of the features described in this chapter, you must install a Wireless Intrusion Protection
(RFprotect) license on all controllers in your network. If you install a RFprotect license on a master controller
only, an AP or AM terminated on a local controller will not provide the WIP features.
These features do not require an RFprotect license:
l Rogue AP classification techniques other than AP classification rules
l Rogue containment
l Wired containment
l Wireless containment without Tarpit
For details on commands see the Dell Networking W-Series ArubaOS 6.4.x Command Line Interface Guide.
This chapter contains the following sections:
l Working with the Reusable Wizard on page 532
l Monitoring the Dashboard on page 535
l Detecting Rogue APs on page 536
l Working with Intrusion Detection on page 539
l Configuring Intrusion Protection on page 551
l Configuring the WLAN Management System (WMS) on page 555
l Understanding Client Blacklisting on page 558
l Working with WIP Advanced Features on page 560
l Configuring TotalWatch on page 561
l Administering TotalWatch on page 563
l Tarpit Shielding Overview on page 564
l Configuring Tarpit Shielding on page 564
Working with the Reusable Wizard
The WebUI’s reusable, intuitive, user-friendly Wizard provides steps to enable, define, or change
l Integrated vs Overlay WLAN/WIP options
l Rules-based rogue classification
l Detection features for attacks against infrastructure
l Detection features for attacks against WLAN clients
l Protection features for attacks against infrastructure
l Protection features for WLAN clients
Figure 67 displays the WIP Wizard layout. Highlighting one of the previously configured rules reveals drop
down menus for changing values. Note that the reusable wizard includes robust online Help.