
24
© 2005 Cisco Systems, Inc. All rights reserved.
Session Number
Presentation_ID
Cisco Confidential
Wireless Intrusion Protection
• Detect common RF-related
attacks
– Netstumbler, wellenreiter, void11,
FakeAP, address spoofing, DoS,
etc.
•
Customizable attack signatures
• Real-time 24x7 monitoring and
alarming
•
Rogue AP detection, location, and
containment
– Identify known (i.e. “trusted”)
rogues
•
Create client exclusion lists
Komentarze do niniejszej Instrukcji