Policy

The WIPS Policy Screen is used to configure policies for rogue AP and wireless attacks on the network. You can configure one overall policy for the Stellar wireless network. When an attack is detected based on the policy, the detected device is banned from the network and is displayed on the Intrusive AP or Wireless Attacks Screens for review. After creating a policy as described below, click on the Apply button to activate the policy for the wireless network.

Creating Rogue AP Policies

A rogue AP is an unauthorized AP connected to the wired side of the network, that is considered a security threat to the wireless network. An interfering AP is an AP seen in the wireless environment but not connected to the wired network, which is not considered a direct security threat. However, some interfering APs may have an impact on network quality and can interfere with valid client access to the network. Complete the fields below to configure rules to classify interfering APs as rogue APs.

Recognition Policy

Friendly AP

Note: The default MAC OUIs (34:e7:0b, dc:08:56, and 88:3c:93) are required for Stellar APs. Also note that you can have a maximum of 32 Friendly MAC OUIs/MAC addresses, including the three default Stellar AP MAC OUIs.

Containment Policy

Creating Wireless Attack Policies

A rogue AP is not the only threat to the wireless network, other wireless attacks can be detected and mitigated for both APs and Clients. To create Wireless Attack Policies, you must enable Wireless Detection. When configuring a policy, each detection policy can be set to one of the following levels. When a level is selected, all detection policies included in that level are displayed and selected.

The sections below describe each of the Wireless Attack Policies.

AP Attack Detection Policy

An AP Attack Detection Policy detects multiple attacks originating from foreign APs. The following detection methods are available depending on the level selected.

Client Attack Detection Policy

A Client Attack Detection Policy detects attacks originating from wireless clients. The following detection methods are available depending on the level selected.

Client Blocklist Policy

There are two sources for the Client Blocklist: created manually by user or added dynamically by system. If the Dynamic Client Blocklist is enabled, intruders discovered by WIPS are dynamically added into the Client Blocklist and prevented from associating with the network. The following detected items are added to the Client Blocklist by system: List of Client Attack Detection, ad hoc clients, Clients associated to rogue AP.