Access Role Profile
|
DAC provides authenticated users by appropriate rights with Access Role Profile. Details as following:
a. Administrator can define detailed Policy and Policy list for each Profile;
b. Policy supports ACL, while Policy list consist of a group of policies;
c. Administrator can define access control rules based on location and period attribute;
d. Support QoS attribute likes bandwidth limitation on uplink or downlink for each profile;
e. Support VLAN attribute, to assign specific clients into defined VLAN or VLAN pool;
f. Access Role Profile function is implemented on AP
|
Wireless Intrusion Detection System
|
DAC provides comprehensive security function to ensure customer wireless cyber security. The system identifies rogue APs by means of following policy and criteria.
a. To detect when APs’ signal strength threshold exceeds the value defined by administrator;
b. To detect if APs’ SSID name is valid according to system definition;
c. To detect by defined key words (defined by administrator) within SSID name of APs;
d. To detect by defined OUI (Organizational Unique Identifier within first six digits of MAC address) of APs, refer to Blacklist mechanism;
e. To detect by defined legal OUI, refer to Whitelist mechanism;
DAC is also able to detect following cyber-attack behaviors from potential rogue APs or clients:
a. APs: AP Spoofing, Broadcast de-authentication, Broadcast disassociation, Ad-hoc network with SSID being used in current infrastructure, invalid long SSID, AP impersonation, Omerta attack, Null probe response, invalid address combination, invalid reason code of de-authentication, invalid reason code of dis-association;
b. Clients: Valid Client mis-association, Omerta Attack, Unencrypted Valid Clients, 802.11 40MHz bandwidth intolerance setting, Active 802.11n Greenfield Mode, DHCP client ID, DHCP conflict, DHCP name change, Frequent authentication, long SSID (client), Malformed Frame-Assoc request, invalid reason code of de-authentication, invalid reason code of dis-association;
|
Wireless Intrusion Prevention System
|
In cooperate with WIDS, DAC provides WIPS to implement relevant security policies:
a. Security policy to suppress rogue APs to mitigate destructive impacts, by preventing clients from connecting to rogue APs;
b. Security policy to suppress rogue clients (active/passive) to mitigate negative effects, by means of blacklist mechanism (static or dynamic);
c. Security policy to protect legal equipment by providing whitelist mechanism
|
Wireless Cyber Security Dashboard
|
DAC provide informative dashboard to represent wireless cyber security situation, which is a comprehensive tool to inform user of security status and events.
a. Show Rogue APs and channel interference;
b. Show Rogue Clients and associated Rogue APs;
c. Show Blacklist status of clients;
d. Show cyber-attack behavior with details like time record, and etc.
|