Users Guide

Table Of Contents
484 | Wireless Intrusion Prevention Dell PowerConnect ArubaOS 5.0 | [User Guide
Client Blacklisting
When a client is blacklisted in the Dell system, the client is not allowed to associate with any AP in the network
for a specified amount of time. If a client is connected to the network when it is blacklisted, a deauthentication
message is sent to force the client to disconnect. While blacklisted, the client cannot associate with another SSID
in the network.
Methods of Blacklisting
There are several ways in which a client can be blacklisted in the Dell system:
z You can manually blacklist a specific client. See “Manual Blacklisting” on page 485 for more information.
z A client fails to successfully authenticate for a configured number of times for a specified authentication
method. The client is automatically blacklisted. See “Authentication Failure Blacklisting” on page 485 for
more information.
z A denial of service or man in the middle (MITM) attack has been launched in the network. Detection of these
attacks can cause the immediate blacklisting of a client. See “Attack Blacklisting” on page 485 for more
information.
z An external application or appliance that provides network services, such as virus protection or intrusion
detection, can blacklist a client and send the blacklisting information to the controller via an XML API server.
When the controller receives the client blacklist request from the server, it blacklists the client, logs an event,
and sends an SNMP trap.
See Chapter 30, “External Services Interface” for more information.
Enabled Enabled If there are entries in the valid SSID list:
z Clients can connect to valid SSIDs on valid APs.
z Clients cannot connect to valid SSIDs on interfering APs (including known
interfering APs).
z Clients cannot connect to SSIDs not in the valid SSID list on valid APs.
z Clients can connect to SSIDs not in the valid SSID list on interfering APs.
If the valid SSID list is empty, it is ignored and clients can connect to all SSIDs on
both valid APs and interfering APs (including known interfering APs). Not adding
an SSID to the valid SSID list exposes that SSID to honeypot attacks.
Disabled Enabled
If there are entries in the valid SSID list:
z Clients can connect to valid SSIDs on valid APs.
z Clients can connect to valid SSIDs on interfering APs (including known
interfering APs).
z Clients cannot connect to SSIDs not in the valid SSID list on valid APs.
z Clients can connect to SSIDs not in the valid SSID list on interfering APs.
If the valid SSID list is empty, it is ignored and clients can connect to all SSIDs on
both valid APs and interfering APs (including known interfering APs). When Multi-
Tenancy protection is disabled, the network is susceptible to honeypot attacks.
Table 102 Valid SSIDs with Multi-Tenancy and Misconfigured AP Protection
Multi-Tenancy
Protection
Misconfigured
AP Protection
Client Connections
Note: The External Services Interface feature require the Policy Enforcement Firewall Next Generation (PEFNG) license installed
in the controller.