Lesson 4: How to use wireless IDS/IPS
In Lesson 4 of Wireless Security Lunchtime Learning, you'll walk away with an understanding of the value of wireless IDS/IPS -- even if your organization doesn't support a wireless LAN. Also learn how to choose a WIDS for your environment and how to fight wireless DoS attacks.
In Lesson 4 of Wireless Security Lunchtime Learning, you'll walk away with an understanding of the value of wireless IDS/IPS -- even if your organization doesn't support a wireless LAN. Also, learn how to choose a WIDS for your environment and how to fight wireless DoS attacks. |
MAIN MENU |
Wireless Security Lunchtime Learning Home Lesson 1: How to counter wireless threats and vulnerabilities Lesson 2: How to build a secure wireless infrastructure Lesson 3: How to implement secure access Lesson 4: How to use wireless IDS/IPS |
Webcast: I'll be watching you: Wireless IDS/IPS
Length: 20 minutes
Wireless intrusion detection and prevention systems have become standard operating procedure in corporate networks, including those without formal Wi-Fi deployment. From enforcing "no wireless" policies to blocking unauthorized sessions, these systems help companies see what's happening in their WLANs and provide tools to take corrective action. This webcast describes the role of WIDS/WIPS in WLAN security, the features commonly provided by WIDS/WIPS, and how WIDS/WIPS differ from (and complement) their wired network counterparts.
Tip: Fighting wireless DoS attacks
Despite recent 802.11 security advances, WLANs remain very vulnerable to denial-of-service attacks. While you may not be able to prevent DoS attacks, a WIDS/WIPS can help you detect when DoS attacks occur and where they come from, so that you can track the intruder down and bring him to justice -- or at least scare him away. This tip offers practical advice on how to recognize and respond to DoS attacks launched against your WLAN.
Tip: To block or not to block: Rogue containment methods
Wireless network monitoring systems are quickly moving from detection alone to detection and prevention. In particular, many now provide options to "block" rogue devices, preventing wireless or wired network access. This tip explores how these containment features work, their potential side-effects and what network administrators should consider before activating them.
Tip: Overlay vs. embedded WIDS sensors
Wireless intrusion detection systems rely on sensors to observe and forward traffic summaries to a central analysis server. Overlay WIDSes use special-purpose sensors dedicated to this monitoring task. Embedded WIDSes use APs to monitor the WLAN in their spare time. This tip compares these two WIDS approaches so that you can choose the one that best fits your network and security needs.
READ THIS TIP
Tip: Using your WIDS to monitor WLAN performance
Wireless intrusion detection: the very name brings to mind security. But many WIDS products can also be used to monitor WLAN performance, providing valuable insight for trouble-shooting, fine-tuning, and usage planning. This tip explains how to leverage your WIDS get more from your WLAN.
Quiz
Find out how much you learned from Lesson 4.
TAKE THE QUIZ
About the Instructor |
![]() |
|
![]() |
Lisa teaches about wireless LANs, mobile security and virtual private networking at many industry conferences and on-line webinars. Lisa's WLAN Advisor and Wireless-To-Go columns are published by SearchNetworking.com and SearchMobileComputing.com where she is a site expert on wireless LANs. She also has written extensively about network infrastructure and security technologies for numerous publications including Wi-Fi Planet, ISP-Planet, Business Communications Review, Information Security and SearchSecurity.com.