A user can change the classification of an unauthorized AP that is detected by the WI or
that is classified according to the rule configured by a user.
Configuration using CLI
1) Go to configure wi device configuration mode of CLI.
WEC8500# configure terminal
WEC8500/configure# wi
WEC8500/configure/wi# device
WEC8500/configure/wi/device#
By using the MAC of an unauthorized AP to change, execute the move command.
move [MAC] [FROM] [TO]
CHAPTER 8. Security
2) To check the changed configuration, use the following command.
show wi device ap list managed
show wi device ap list unmanaged
Configuration using Web UI
In the menu bar of <WEC Main window>, select <Monitor> and then select the
<Wireless Intrusion> <AP> menu in the sub-menus. And when the AP list is displayed,
select one out of the AP list to go to the detail view screen. In the detail view screen,
operator can manually change the classification of an AP by using the top down menu of
MOVE CLASSIFICATION MANUALLY.
A user can manually change the status of an unauthorized AP to ‘Removed’, that is
detected by the WIDS or that is classified according to the rule configured by a user.
Configuration using CLI
1) Go to configure wi device configuration mode of CLI.
WEC8500# configure terminal
WEC8500/configure# wi
WEC8500/configure/wi# device
WEC8500/configure/wi/device#
2) By using the MAC of an unauthorized AP to change, execute the remove command.
remove [MAC]
CHAPTER 8. Security
3) To check the changed configuration, use the following command.
show wi device ap list removed
Configuration using Web UI
In the menu bar of <WEC Main window>, select <Monitor> and then select the
<Wireless Intrusion> <AP> menu in the sub-menus. And when the AP list is displayed,
check a desired MAC in the list and click the <Remove> button to manually remove an AP.
In addition, after going into the detail view screen by selecting one out of the AP list,
operator can also remove an AP by changing the REMOVE MANUALLY option to On.
1) In the AP list screen, operator can change the status of several APs to ‘Removed’ by
The description of OPTION parameter is as follows:
Parameter
Description
ap-blacklist-check
Allocates Rogue ID = 101 by checking a rogue included in the
black list.
managed_ssid_invalid_security
Allocates Rogue ID = 102 for an AP that uses a managed
SSID and its managed client is in the association status.
fakeap-beacon-on-invalid-channel
Allocates rogue ID = 103 for an AP whose UIC is invalid and
that uses a SSID that is not in the ssid white list among the
APs that use a managed MAC.
fakeap-beacon-without-ssid
Allocates Rogue ID = 104 for an AP whose UIC is invalid and
its SSID is hidden among the APs that use a managed MAC.
fakeap-managed-ssid
Allocates Rogue ID = 105 for an AP whose UIC is invalid and
its channel is not in the channel validation list among the APs
that use a managed MAC.
illegal-channel
Allocates Rogue ID = 106 if an AP uses a channel that is not
in the channel validation list among detected APs.
managedap-invalid-ssid
Allocates Rogue ID = 107 for an AP that uses a SSID that is
not in the ssid-whitelist among the APs that use a managed
MAC and its UIC is valid.
unknownap-managed-ssidwithauth-client
Allocates Rogue ID = 108 by checking the association status
between an unauthorized AP and a managed client.
CHAPTER 8. Security
3) To check the changed configuration, use the following command.
show wi device ap current-config
Configuration using Web UI
In the menu bar of <WEC Main window>, select <Configuration> and then select the
<Wireless Intrusion> <Policy> <Static Rule> menu in the sub-menus. And then,
operator can change the setting by selecting <AP> at the upper tab and clicking Apply.
In the configuration screen, operator can check Option and click Apply for configuration.
Figure 169. Configuration Window for Unauthorized AP Detection Option
3) To check the changed configuration, use the following command.
show wi device client current-config
Configuration using Web UI
In the menu bar of <WEC Main window>, select <Configuration> and then select the
<Wireless Intrusion> <Policy> <Static Rule> menu in the sub-menus. And then,
operator can change the setting by selecting <Station> at the upper tab and clicking Apply.
In the configuration screen, operator can check Option and click Apply for configuration.
Figure 170. Configuration Window for Unauthorized Station Detection Option
The unauthorized channel validation function helps an operator detect an AP that uses an
unauthorized channel other than configured channels. The configuration procedure is as
follows:
Configuration using CLI
1) Go to configure wi channel-validation configuration mode of CLI.
WEC8500# configure terminal
WEC8500/configure# wi
WEC8500/configure/wi# channel-validation
2) Enable the unauthorized channel validation function.
4) To check the changed configuration, execute the following command.
show wi current-config
Configuration using Web UI
In the menu bar of <WEC Main window>, select <Configuration> and then select the
<Wireless Intrusion> <Channel Validation> menu in the sub-menus. And then,
operator can configure the SERVICE STATE and Valid Channel List in the screen.
Operator can change configuration after changing the SERVICE STATE and Valid Channel
List and clicking Apply.
Figure 171. Configuration Window for Channel Validation
8.2.2.8 Configuring and Searching Black/White List
Operator can configure classification to distinguish authorized and unauthorized
APs/stations. The administrator configurable lists include <AP black-list, Station black-list,
Managed OUI, Managed/Neighbor AP>. The <Managed AP, Managed Station, Managed
SSID> are automatically configured and can be used only for search.
Configuration using CLI
1) Go to the configure wids configuration mode of CLI.
MAC address that will be used as a black-list of the station
Parameter
Description
OUI
First 3 bytes of station MAC address
Parameter
Description
MAC
AP MAC address of Managed/Neighbor AP
TYPE
- Managed: Indicates that the address is located internally
during configuration
- Neighbor: Indicates that the address is located externally
during configuration
ap-blacklist [MAC]
3) Configure the station black-list.
client-black-list [MAC]
4) Configure the Managed Organizationally Unique Identifier (OUI).
oui-whitelist [OUI]
CHAPTER 8. Security
5) Configure the Managed/Neighbor AP.
Managed [MAC] [TYPE]
6) To check the changed configuration, execute the following command.
show wi lists managed-ap
show wi lists ap-blacklist
show wi lists managed-stat
show wi lists client-blacklist
show wi lists managed ssid
show wi lists oui-list
show wi lists neighbor-ap
In the menu bar of <WEC Main window>, select <Configuration> and then select the
<Wireless Intrusion> <Classifiation> menu in the sub-menus. And then, operator can
configure and search by using the upper tab in the screen.
1) In the [AP Blacklist] tab, operator can add an AP blacklist by entering a MAC and
click Add. Operator can also delete it by using Delete.
Figure 172. AP blacklist Configuration Window
2) In the [Managed AP] tab, operator can search for a Managed AP.
7) If you click Add in the [Managed/Neighbor AP] tab, operator can go to the Managed/
Neighbor AP list addition screen and can add a Managed/Neighbor AP list.
Operator can also delete it by using Delete.
[Managed/Neighbor AP] tab main screen
Figure 177. Managed/Neighbor AP Search/Configuration Window
Managed/Neighbor AP list addition screen
Figure 178. Managed/Neighbor AP List Addition Window
8.2.2.9 Station Allow Limit
The WIDS counts the number of frames and number of authentication failures to
distinguish a station that generates too many management frames in a network or that is
continuously failed for authentication. A threshold value is defined for the count and a
station is recognized as an unauthorized station if the count exceeds the threshold.
Configuration using CLI
1) Go to the configure wi device client configuration mode.
WEC8500# configure terminal
WEC8500/configure# wi
WEC8500/configure/wi# device
WEC8500/configure/wi/device# client
WEC8500/configure/wi/device/client#
- 80211-auth-req: Authentication requests threshold per second
- 80211-probe-req: Probe requests threshold per second
- 80211-deauth-req: De-authentication requests threshold per second
- 80211-assoc-fail: Association failures threshold per second
- 80211-auth-fail: Authentication failures threshold per second
- 8021x-auth-fail: 802.1x authentication failures threshold per WIDS interval
- web-auth-fail: Web authentication failures threshold that occurs continuously
COUNT
Threshold value of [OPTION] ranging from 3 to 20
2) Configure a threshold.
allowed-limit [OPTION] [COUNT]
Configuration using Web UI
In the menu bar of <WEC Main window>, select <Configuration> and then select the
<Wireless Intrusion> <Station Allow Limit> menu in the sub-menus. And then, enter
a threshold value and click Apply to configure the value in the screen.
Figure 179. Station Allowed Limit Configuration Window
- radius-only: Uses the authentication of the RADIUS server.
- local-radius: Uses the authentication of the RADIUS if the
internal authentication is failed.
The W-EP WLAN system provides the Captive Portal function. A guest user can receive a
normal service after connected to a specific WLAN (SSID) and going through user
authentication.
8.3.1 Configuring Guest Authentication
Configuration using CLI
To configure guest authentication, go to the Configure mode and execute the command.
1) Go to configure security captive-portal configuration mode of CLI.
The operator can check and delete a guest created in the <Guest Users> menu.
Figure 185. Guest User List Window
In the <Guest Users> menu, the operator can select Auth Type and also PRIMARY
RADIUS and SECONDARY RADIUS servers.
Figure 186. Guest Auth Configuration Window
8.3.2 Configuring Guest ACL
To operate the captive portal services, redirection must be basically performed and if a drop
occurs by the Pre-Auth ACL of the WLAN, the redirection is performed.
Accordingly, the proper configuration of the ACL for guests is necessary depending on
types of captive portal services.
For the guest ACL, the DNS permit rule, and the permit rule for the web service address
used by the captive portal are basically necessary and the permit rule of the address of the
external web server is additionally necessary if the external web server is used.
Configuration using CLI
To configure the guest ACL, execute the following command:
1) Go to configure fqm-mode configuration mode of CLI.
WEC8500/configure/fqm-mode# access-list ip guest_acl permit seq 4 tcp
90.90.100.120 255.255.255.255 eq 80 any eq * os-aware *
WEC8500/configure/fqm-mode# access-list ip guest_acl permit seq 5 tcp
any eq * 90.90.100.120 255.255.255.255 eq 80 os-aware *
WEC8500/configure/fqm-mode# access-list ip guest_acl permit seq 6 udp
any eq * any eq * os-aware *
WEC8500/configure/fqm-mode# access-list ip guest_acl permit seq 7 tcp
192.168.10.10 255.255.255.255 eq 80 any eq * os-aware *
WEC8500/configure/fqm-mode# access-list ip guest_acl permit seq 8 tcp
any eq * 192.168.10.10 255.255.255.255 eq 80 os-aware *
WEC8500/configure/fqm-mode# access-list ip guest_acl permit seq 10 tcp
192.168.0.0 255.255.0.0 eq * any eq 443 os-aware *
Configuration using Web UI
In the menu bar of <WEC Main window>, select <Configuration> and then select the
<IP ACL> menu in the <Access Control Lists> sub-menu of <Security> in the sub-
menus.
Select Add on the <IP ACL> screen and then configure the ACL.
4) To check the configuration, use the ‘show security captive-portal web-auth’ command.
WEC8500# show security captive-portal web-auth
Configuration using Web UI
In the menu bar of <WEC Main window>, select <Configuration> and then select the
<WLANs> menu in the sub-menus. In the WLANs screen, select WLAN ID and enable the <GUEST SERVICE> option.
Figure 189. WLAN Guest Configuration Window
Go to the <L3> of the <Security> tab.
Enable <WEB POLICY> and select the Web Authentication item and then designate the
ACL set in the guest ACL to <PRE-AUTHENTICATION ACL>.
To change a URL, enable <OVERRIDING REDIRECT ACL> and configure <URL>.
In the <CaptivePortal> <Web Authentication> menu, the operator can select web
authentication method. The operator can also configure Redirect as the operation after
authentication.
8.3.4 Configuring Web Authentication on MAC Authentication
Failure
To provide the service of Web Authentication on MAC Authentication Failure, the MAC
Authentication of security L2 of the WLAN must be enabled and the web policy of L3 and
the web authentication of the captive portal must be configured.
Configuration using CLI
[WLAN Configuration]
To configure Web Authentication on MAC Authentication Failure in the WLAN, execute
the command as follows:
1) Go to configure WLAN configuration mode of CLI.
URL specified as the operation after authentication
4) To check the configuration, use the ‘show security captive-portal web-auth’ command.
WEC8500# show security captive-portal web-auth
Configuration using Web UI
In the menu bar of <WEC Main window>, select <Configuration> and then select the
<WLANs> menu in the sub-menus. In the WLANs screen, select WLAN ID and enable the <GUEST SERVICE> option.
Figure 192. WLAN Guest Configuration Window
Go to the <L2> of the <Security> tab.
Enable <MAC AUTHENTICATION>.
Go to the <L3> of the <Security> tab.
Enable <WEB POLICY> and select the Web Authentication on MAC Authentication
Failure item and then designate the ACL set in the guest ACL to <PRE-AUTHENTICATION ACL>.
To change a URL, enable <OVERRIDING REDIRECT ACL> and configure <URL>.
In the <CaptivePortal> <Web Authentication> menu, the operator can select web
authentication method. The operator can also configure Redirect as the operation after
authentication.