In Lesson 4 of Wireless Security Lunchtime Learning, you'll walk away with an understanding of the value of wireless IDS/IPS -- even if your organization doesn't support a wireless LAN. Also, learn how to choose a WIDS for your environment and how to fight wireless DoS attacks.
Webcast:I'll be watching you: Wireless IDS/IPS
Length: 20 minutes
Wireless intrusion detection and prevention systems have become standard operating procedure in corporate networks, including those without formal Wi-Fi deployment. From enforcing "no wireless" policies to blocking unauthorized sessions, these systems help companies see what's happening in their WLANs and provide tools to take corrective action. This webcast describes the role of WIDS/WIPS in WLAN security, the features commonly provided by WIDS/WIPS, and how WIDS/WIPS differ from (and complement) their wired network counterparts.
Tip:Fighting wireless DoS attacks
Despite recent 802.11 security advances, WLANs remain very vulnerable to denial-of-service attacks. While you may not be able to prevent DoS attacks, a WIDS/WIPS can help you detect when DoS attacks occur and where they come from, so that you can track the intruder down and bring him to justice -- or at least scare him away. This tip offers practical advice on how to recognize and respond to DoS attacks launched against your WLAN.
Tip:To block or not to block: Rogue containment methods
Wireless network monitoring systems are quickly moving from detection alone to detection and prevention. In particular, many now provide options to "block" rogue devices, preventing wireless or wired network access. This tip explores how these containment features work, their potential side-effects and what network administrators should consider before activating them.
Tip:Overlay vs. embedded WIDS sensors
Wireless intrusion detection systems rely on sensors to observe and forward traffic summaries to a central analysis server. Overlay WIDSes use special-purpose sensors dedicated to this monitoring task. Embedded WIDSes use APs to monitor the WLAN in their spare time. This tip compares these two WIDS approaches so that you can choose the one that best fits your network and security needs.
Tip:Using your WIDS to monitor WLAN performance
Wireless intrusion detection: the very name brings to mind security. But many WIDS products can also be used to monitor WLAN performance, providing valuable insight for trouble-shooting, fine-tuning, and usage planning. This tip explains how to leverage your WIDS get more from your WLAN.
Lisa Phifer owns Core Competence Inc., a consulting firm specializing in network security and management technology. Lisa has been involved in the design, implementation and evaluation of data communications, internetworking, security and network management products for over 20 years. At Core Competence, she has advised large and small companies regarding security needs, product assessment and the use of emerging technologies and best practices. Before joining Core Competence, Lisa was a Member of Technical Staff at Bell Communications Research where she won a president's award for her work on ATM Network Management.
Lisa teaches about wireless LANs, mobile security and virtual private networking at many industry conferences and on-line webinars. Lisa's WLAN Advisor and Wireless-To-Go columns are published by SearchNetworking.com and SearchMobileComputing.com where she is a site expert on wireless LANs. She also has written extensively about network infrastructure and security technologies for numerous publications including Wi-Fi Planet, ISP-Planet, Business Communications Review, Information Security and SearchSecurity.com.
Value-added resellers and service providers interested in reselling Aruba networking hardware and software can learn the benefits of becoming an Aruba Networks partner with this standardized checklist. Compare Aruba's reseller partner program with other vendors' offering similar products.