Lesson 4: How to use wireless IDS/IPS

In Lesson 4 of Wireless Security Lunchtime Learning, you'll walk away with an understanding of the value of wireless IDS/IPS -- even if your organization doesn't support a wireless LAN. Also learn how to choose a WIDS for your environment and how to fight wireless DoS attacks.

In Lesson 4 of Wireless Security Lunchtime Learning, you'll walk away with an understanding of the value of wireless IDS/IPS -- even if your organization doesn't support a wireless LAN. Also, learn how to choose a WIDS for your environment and how to fight wireless DoS attacks.

   Webcast: I'll be watching you: Wireless IDS/IPS
   Tip: Fighting wireless DoS attacks
   Tip: To block or not to block: Rogue containment methods
   Tip: Overlay vs. embedded WIDS sensors
   Quiz
   About the Instructor

MAIN MENU
Wireless Security Lunchtime Learning Home

Lesson 1: How to counter wireless threats and vulnerabilities

Lesson 2: How to build a secure wireless infrastructure

Lesson 3: How to implement secure access

Lesson 4: How to use wireless IDS/IPS

  

Webcast: I'll be watching you: Wireless IDS/IPS
Length: 20 minutes
Wireless intrusion detection and prevention systems have become standard operating procedure in corporate networks, including those without formal Wi-Fi deployment. From enforcing "no wireless" policies to blocking unauthorized sessions, these systems help companies see what's happening in their WLANs and provide tools to take corrective action. This webcast describes the role of WIDS/WIPS in WLAN security, the features commonly provided by WIDS/WIPS, and how WIDS/WIPS differ from (and complement) their wired network counterparts.

VIEW THIS WEBCAST

  

Tip: Fighting wireless DoS attacks
Despite recent 802.11 security advances, WLANs remain very vulnerable to denial-of-service attacks. While you may not be able to prevent DoS attacks, a WIDS/WIPS can help you detect when DoS attacks occur and where they come from, so that you can track the intruder down and bring him to justice -- or at least scare him away. This tip offers practical advice on how to recognize and respond to DoS attacks launched against your WLAN.

READ THIS TIP

  

Tip: To block or not to block: Rogue containment methods
Wireless network monitoring systems are quickly moving from detection alone to detection and prevention. In particular, many now provide options to "block" rogue devices, preventing wireless or wired network access. This tip explores how these containment features work, their potential side-effects and what network administrators should consider before activating them.

READ THIS TIP

  

Tip: Overlay vs. embedded WIDS sensors
Wireless intrusion detection systems rely on sensors to observe and forward traffic summaries to a central analysis server. Overlay WIDSes use special-purpose sensors dedicated to this monitoring task. Embedded WIDSes use APs to monitor the WLAN in their spare time. This tip compares these two WIDS approaches so that you can choose the one that best fits your network and security needs.

READ THIS TIP

  

Tip: Using your WIDS to monitor WLAN performance
Wireless intrusion detection: the very name brings to mind security. But many WIDS products can also be used to monitor WLAN performance, providing valuable insight for trouble-shooting, fine-tuning, and usage planning. This tip explains how to leverage your WIDS get more from your WLAN.

READ THIS TIP

  

Quiz
Find out how much you learned from Lesson 4.

TAKE THE QUIZ

  About the Instructor

Lisa Phifer owns Core Competence Inc., a consulting firm specializing in network security and management technology. Lisa has been involved in the design, implementation and evaluation of data communications, internetworking, security and network management products for over 20 years. At Core Competence, she has advised large and small companies regarding security needs, product assessment and the use of emerging technologies and best practices. Before joining Core Competence, Lisa was a Member of Technical Staff at Bell Communications Research where she won a president's award for her work on ATM Network Management.

Lisa teaches about wireless LANs, mobile security and virtual private networking at many industry conferences and on-line webinars. Lisa's WLAN Advisor and Wireless-To-Go columns are published by SearchNetworking.com and SearchMobileComputing.com where she is a site expert on wireless LANs. She also has written extensively about network infrastructure and security technologies for numerous publications including Wi-Fi Planet, ISP-Planet, Business Communications Review, Information Security and SearchSecurity.com.

  

Dig Deeper on Network infrastructure

Unified Communications
Mobile Computing
Data Center
ITChannel
Close