
5-73
Cisco Wireless LAN Controller Configuration Guide
OL-13826-01
Chapter 5 Configuring Security Solutions
Configuring IDS
Step 2 To see more information on the attacks detected by a particular signature, click the signature type link
for that signature. The Signature Events Detail page appears (see Figure 5-42).
Figure 5-42 Signature Events Detail Page
This page shows the following information:
• The MAC addresses of the clients identified as attackers
• The method used by the access point to track the attacks
• The number of matching packets per second that were identified before an attack was detected
• The number of access points on the channel on which the attack was detected
• The day and time when the access point detected the attack
Step 3 To see more information for a particular attack, click the Detail link for that attack. The Signature Events
Track Detail page appears (see Figure 5-43).
Figure 5-43 Signature Events Track Detail Page
This page shows the following information:
• The MAC address of the access point that detected the attack
• The name of the access point that detected the attack
• The type of radio (802.11a or 802.11b/g) used by the access point to detect the attack
• The radio channel on which the attack was detected
• The day and time when the access point reported the attack
Comentarios a estos manuales