Quick Reference Guide

Management and Monitoring
91
ProSafe Premium 3 x 3 Dual-Band Wireless-N Access Point WNDAP660
Disassociation flood Attack. Multiple disassociation frames (5 or more) that use the
spoofed MAC address of the wireless access point are sent to a
legitimate client.
Result.
The client is disconnected from the wireless access
point.
Note: The IDS detects this attack, but the IPS d
oes not take action
against this attack.
5 Trap
Malformed 802.11
pa
ckets detected
Detection. Multiple malformed packets (5 or more) are sent to
the wireless access point.
Result. Clie
nts behave unexpectedly or crash.
Solution. T
he wireless access point drops the malformed
packets.
5 Trap
EAPOL-start attack Attack.
Multiple EAPOL start frames (5 or more) are sent to the
wireless access point to initiate the RADIUS authentication
process for clients.
Result.
Wireless service is disrupted.
Solution. T
he wireless access point determines if the legitimate
clients have already been authenticated before processing
EAPOL start frames.
5 Trap
EAPOL-logoff attack Attack. Sever
al EAPOL logoff frames (2 or more) that use the
spoofed MAC address of a legitimate client are sent to the
wireless access point to terminate a RADIUS-authenticated
session.
Result.
The client is disconnected from the wireless access
point.
Solution. T
he wireless access point determines if it still
receives traffic from the client before disconnecting the client.
2 Trap
Premature EAP
fail
ure attack
Attack. Several premature EAP failure frames (2 or more) are
sent to a legitimate client to suggest RADIUS authentication
failure.
Result. T
he client cannot be authenticated and cannot connect
to the wireless access point.
Note: The IDS detects this attack, but the IPS d
oes not take action
against this attack.
2 Trap
Premature EAP
su
ccess attack
Attack. Several premature EAP success frames (2 or more) are
sent to a legitimate client to suggest RADIUS authentication
success.
Result. T
he client cannot be authenticated and cannot connect
to the wireless access point.
Note: The IDS detects this attack, but the IPS d
oes not take action
against this attack.
2 Trap
Table 24. IDS/IPS policies and policy rules (continued)
Policy Description Policy Rule
Threshold Notification