802.11 networks are susceptible to a wide array of threats such as unauthorized access points and clients, ad-hoc networks, and DoS attacks. The Wireless Intrusion Detection System (WIDS) in WSM is used for the early detection of malicious attacks and intrusions on a wireless network. It detects rogue devices in a WLAN and takes countermeasures to protect the WLAN.
Before you perform WIDS management for Comware-based devices, select APs for proactive monitoring and set their operating mode to monitor or hybrid. For information about the configuration procedure, see Modify Fit AP Template Information.
WSM allows you to configure the WIDS function for ACs. You can configure WIDS detection rules, query WIDS status, batch enable or disable WIDS, and import or export authorized APs.
For Comware-based devices, you can perform the following functions:
For MSM devices, you can perform the following functions:
WSM allows you to query rogue APs by different conditions, add or remove rogue APs to or from the attack list, and add rogue APs to the permit list.
For Comware-based devices, you can perform the following functions:
For MSM devices, you can perform the following function:
Rogue Client Management is supported only by Comware-based devices. WSM allows you to query rogue clients by different conditions, add or remove rogue clients to or from the attack list, and add rogue clients to the permit list.
You can perform the following functions: