User's Manual
43 | Wireless configuration HP Cloud Network Manager | User Guide
logged information.
The IDS feature in the Cloud Network Manager network enables you to detect rogue APs, interfering APs, and
other devices that can potentially disrupt network operations.
This chapter describes the following procedures:
l Detecting and classifying rogue APs on page 43
l OS fingerprinting on page 43
l Configuring wireless intrusion protection and detection levels on page 43
Detecting and classifying rogue APs
A rogue AP is an unauthorized AP plugged into the wired side of the network.
An interfering AP is an AP seen in the RF environment but it is not connected to the wired network. While the
interfering AP can potentially cause RF interference, it is not considered a direct security threat, because it is not
connected to the wired network. However, an interfering AP may be reclassified as a rogue AP.
The built-in IDS scans for APs that are not controlled by the VC. These are listed and classified as either Interfering
or Rogue, depending on whether they are on a foreign network or your network.
OS fingerprinting
The OS fingerprinting feature finds the operating system of the client. The following is a list of advantages of this
feature:
l Identifying rogue clients — Helps to identify clients that are running on forbidden operating systems.
l Identifying outdated operating systems — Helps to locate outdated and unexpected OS in the company
network.
l Locating and patching vulnerable operating systems — Assists in locating and patching specific operating
system versions on the network that have known vulnerabilities, thereby securing the company network.
OS fingerprinting is enabled in the Cloud Network Manager network by default. The following operating systems
are identified by Cloud Network Manager:
l Windows 7
l Windows Vista
l Windows Server
l Windows XP
l Windows ME
l OS X
l iPhone
l iOS
l Android
l Blackberry
l Linux
Configuring wireless intrusion protection and detection levels
WIP offers a wide selection of intrusion detection and protection features to protect the network against wireless
threats.
Like most other security-related features of the Cloud Network Manager network, the WIP can be configured on the
AP.