
1-18
Cisco Wireless LAN Solution Product Guide
OL-7955-01
Chapter 1 Overview
Pico Cell Functionality
Pico Cell Functionality
Pico Cell functionality includes optimization of the operating system (operating system) to support this
functionality as follows:
• The Cisco WCS Pico Cell Mode parameter reconfigures operating system parameters, allowing
operating system to function efficiently in pico cell deployments. Note that when the operator is
deploying a pico cell network the operating system must also have more memory allocated (512 to
2048 MB) using the config database size 2048 CLI command.
• Client mobility between multiple mobility domains when such exist.
• Addition of a WPA2 VFF extension to eliminate the need to re-key after every association. This
allows the re-use of existing PTK and GTK.
• With WPA2 PMK caching and VFF, the PMK cache is transferred as part of context transfer prior
to the authentication phase. This allows expedited handoffs to work for both intra- and inter-Cisco
Wireless LAN Controller roaming events.
• A beacon/probe response that allows a Cisco 1000 Series lightweight access point to indicate which
Cisco Wireless LAN Controller it is attached to so that reauthorization events only occur when
needed, minimizing inter-Cisco Wireless LAN Controller handoffs and thus reducing CPU usage.
• Allows changes to Cisco 1000 series lightweight access point sensitivity for pico cells.
• Allows control of Cisco 1000 series lightweight access point fallback behavior to optimize pico cell
use.
• Supports heat maps for directional antennas.
• Allows specific control over blacklisting events
• Allows configuring and viewing basic LWAPP configuration using the Cisco 1000 series lightweight
access point CLI.
Intrusion Detection Service (IDS)
Intrusion Detection Service includes the following:
• Sensing Clients probing for “ANY” SSID
• Sensing if Cisco 1000 series lightweight access points are being contained
• Notification of MiM Attacks, NetStumbler, Wellenreiter
• Management Frame Detection and RF Jamming Detection
• Spoofed Deauthentication Detection (AirJack, for example)
• Broadcast Deauthorization Detection
• Null Probe Response Detection
• Fake AP Detection
• Detection of Weak WEP Encryption
• MAC Spoofing Detection
• AP Impersonation Detection
• Honeypot AP Detection
• Valid Station Protection
Comentarios a estos manuales