User's Manual
Table Of Contents
- Table of Contents
- List of Figures
- Introduction
- Installing the Wireless Array
- Installation Prerequisites
- Planning Your Installation
- Installation Workflow
- Installing Your Wireless Array
- Powering Up the Wireless Array
- Establishing Communication with the Array
- Entering the License
- Performing the Express Setup Procedure
- The Web Management Interface
- Viewing Status on the Wireless Array
- Configuring the Wireless Array
- Express Setup
- Network
- Services
- VLANs
- Tunnels
- Security
- SSIDs
- Groups
- IAPs
- WDS
- Filters
- Clusters
- Using Tools on the Wireless Array
Wireless Array
332 Configuring the Wireless Array
2. Auto Block Unknown Rogue APs: Enable or disable auto blocking (see
“About Blocking Rogue APs” on page 331). Note that in order to set Auto
Block RSSI and Auto Block Level, you must set Auto Block Unknown
Rogue APs to On. Then the remaining Auto Block fields will be active.
3. Auto Block RSSI: Set the minimum RSSI for rogue APs to be blocked.
APs with lower RSSI values will not be blocked. They are assumed to be
farther away, and probably belonging to neighbors and posing a minimal
threat.
4. Auto Block Level: Select rogue APs to block based on the level of
encryption that they are using. The choices are:
• Automatically block unknown rogue APs regardless of encryption.
• Automatically block unknown rogue APs with no encryption.
• Automatically block unknown rogue APs with WEP or no
encryption.
5. Auto Block Network Types: Select rogues to automatically block by
applying the criteria above only to networks of the type specified below.
The choices are:
• All — the unknown rogues may be part of any wireless network.
• IBSS/AD Hoc only — only consider auto blocking rogues if they
belong to an ad hoc wireless network (a network of client devices
without a controlling Access Point, also called an Independent Basic
Service Set — IBSS).
• ESS/Infrastructure only — only consider auto blocking rogue APs if
they are in infrastructure mode rather than ad hoc mode.
DoS Attack Detection Settings
6. Attack/Event:
The types of DoS attack that you may detect are described
in the Type of Attack Table on page 329. Detection of each attack type
may be separately enabled or disabled. For each attack, a default
Threshold and Period (seconds) are specified. If the number of
occurrences of the type of packet being detected exceeds the threshold in