Users Guide

Table Of Contents
Dell PowerConnect W-Series ArubaOS 6.1 | User Guide | 23
Branch Office Routing Table ................................................................................................527
Configuring OSPF............................................................................................................................528
Deployment Best Practices ..........................................................................................................530
Sample Topology and Configuration ...........................................................................................531
Remote Branch 1 ....................................................................................................................531
Remote Branch 2 ....................................................................................................................532
W-3200 Central Office Controller—Active.........................................................................533
W-3200 Central Office Controller—Backup.......................................................................535
Chapter 29 Wireless Intrusion Prevention....................................................................................... 537
Reusable Wizard.............................................................................................................................537
Wizard Intrusion Detection...................................................................................................538
Wizard Intrusion Protection..................................................................................................539
Protection for Infrastructure ........................................................................................539
Protection for Clients.....................................................................................................539
Monitoring Dashboard...................................................................................................................540
Rogue AP Detection.......................................................................................................................541
Classification Terminology....................................................................................................541
Classification Methodology ..................................................................................................542
Match Methods ..............................................................................................................542
Match Types ...................................................................................................................542
Suspected Rogue Confidence Level ...........................................................................543
AP Classification Rules..........................................................................................................543
SSID specification..........................................................................................................543
SNR specification...........................................................................................................543
Discovered-AP-Count specification ...........................................................................543
Example Rules.................................................................................................................544
Rule Matching.........................................................................................................................544
Intrusion Detection.........................................................................................................................544
Infrastructure Intrusion Detection.......................................................................................544
Detect 802.11n 40MHz Intolerance Setting................................................................547
Detect Active 802.11n Greenfield Mode.....................................................................547
Detect Ad hoc Networks...............................................................................................547
Detect Ad hoc Network Using Valid SSID .................................................................547
Detect AP Flood Attack .................................................................................................547
Detect AP Impersonation..............................................................................................548
Detect AP Spoofing........................................................................................................548
Detect Bad WEP.............................................................................................................548
Detect Beacon Wrong Channel...................................................................................548
Detect Client Flood Attack ............................................................................................548
Detect CTS Rate Anomaly.............................................................................................548
Detect RTS Rate Anomaly.............................................................................................548
Detect Devices with an Invalid MAC OUI ..................................................................548
Detect Invalid Address Combination ..........................................................................548
Detect Overflow EAPOL Key.........................................................................................549
Detect Overflow IE .........................................................................................................549
Detect Malformed Frame-Assoc Request .................................................................549
Detect Malformed Frame-Auth....................................................................................549
Detect Malformed Frame-HT IE...................................................................................549
Detect Malformed Frame-Large Duration..................................................................549
Detect Misconfigured AP .............................................................................................549
Detect Windows Bridge................................................................................................549
Detect Wireless Bridge.................................................................................................549
Detect Broadcast Deauthentication ...........................................................................549
Detect Broadcast Disassociation................................................................................550
Detect Netstumbler........................................................................................................550