Quick Reference Guide
Management and Monitoring
90
ProSafe Premium 3 x 3 Dual-Band Wireless-N Access Point WNDAP660
Table 24. IDS/IPS policies and policy rules
Policy Description Policy Rule
Threshold Notification
Authentication flood • Attack. Multiple authentication requests (5 or more) that use
spoofed MAC addresses of legitimate clients are sent to the
wireless access point.
• R
esult.
The client association table overflows, causing
authentication requests from legitimate clients to be denied.
• Solution. The ol
dest clients that are stuck in the authentication
phase are removed from the table.
5 Trap
Association flood • Attack. Multiple association requests (5 or more) that use
spoofed MAC addresses of legitimate clients are sent to the
wireless access point.
• R
esult.
The client association table overflows, causing
association requests from legitimate clients to be denied.
• Solution. The ol
dest associations are removed from the table.
5 Trap
Unauthenticated
association
• Attack. Multiple unauthenticated association requests (5 or
more) that use spoofed MAC addresses of legitimate clients are
sent to the wireless access point.
• Result.
The client association table overflows, causing
authentication requests from legitimate clients to be denied.
• Solution. The ol
dest clients that are stuck in the authentication
phase are removed from the table.
5 Trap
Association table
ov
erflow
• Attack. Multiple clients (5 or more) that use spoofed MAC
addresses of legitimate clients attempt to connect to the
wireless access point.
• Result.
The client association table overflows, causing
association requests from legitimate clients to be denied.
• Solution. The ol
dest associations are removed from the table.
5 Trap
Authentication
failure att
ack
• Attack. Multiple invalid authentication requests (5 or more) that
use the spoofed MAC address of a legitimate client are sent to
the wireless access point.
• Result.
The client is disconnected from the wireless access
point.
• Solution. The
wireless access point determines if the legitimate
client is already connected before processing an authentication
request.
5 Trap
Deauthentication
broadcast att
ack
• Attack. Multiple deauthentication frames (5 or more) that use
the spoofed MAC address of the wireless access point are sent
to legitimate clients.
• Result. Client
s are disconnected from the wireless access
point.
Note: The IDS detects this attack, but the IPS does not take action
a
gai
nst this attack.
5 Trap










