Specifications
Enabling AP Signatures
22-12 Rogue Detection and Countermeasures
Enabling AP Signatures
AnAPsignatureisasetofbitsinamanagementfram esentbyanAPthatidentifiesthatAPto
MSS.IfsomeoneattemptstospoofmanagementpacketsfromanEnterasysAP,MSScandetect
thespoofattempt.
APsignaturesaredisabledbydefault.Toenableordisablethem,use
thefollowingcommand:
set rfdetect signature {enable | disable}
ThecommandappliesonlytoAPsmanagedbytheRASonwhichyouenterthecommand.To
enablesignaturesonallAPsinaMobilityDomain,enterthecommandoneachRASinthe
MobilityDomain.
Disabling or Reenabling Logging of Rogues
Bydefault,aRASgeneratesalogmessagewhenarogueisdetectedordisappears.Todisableor
reenablethelogmessages,usethefollowingcommand:
set rfdetect log {enable | disable}
Todisplaylogmessagesonaswitch,usethefollowingcommand:
show log buffer
(Thiscommandhasoptionalparameters.Forcompletesyntaxinformation,seetheRoamAbout
MobilitySystemSoftwareCommandLineInterfaceReference.)
Enabling Rogue and Countermeasures Notifications
Bydefault,allSNMPnotifications(informsortraps)aredisabled.Toenableordisable
notificationsforroguedetection,IntrusionDetectionSystem(IDS),andDenial ofService(DoS)
protection,configureanotificationprofilethatsendsallthenotificationtypesforthesefeatures.
(Forsyntaxinformationandanexample,see“Configuringa
NotificationProfile”onpage 6‐5.)
IDS and DoS Alerts
MSScandetectillegitimatenetworkaccessattemptsandattemptstodisruptnetworkservice.In
response,MSSgeneratesmessagesandSNMPnotifications.Thefollowingsectionsdescribethe
typesofattacksandsecurityrisksthatMSScandetect.
Forexamplesofthelogmessagestha tMSSgenerateswhenDoSattacksorothersecurity
risksare
detected,see“IDSLogMessageExamples”onpage 22 ‐15.
Forinformationaboutthenotifications,see“ConfiguringaNotificationProfile”onpage 6‐5.
Note: You must use the same AP signature setting (enabled or disabled) on all RoamAbout
switches in a Mobility Domain.
Note: To detect DoS attacks, active scan must be enabled. (See “Disabling or Reenabling Active
Scan” on page 22-11.)