Configuring Intrusion Detection System
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the <TBD>
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Information About Intrusion Detection System
The Cisco Intrusion Detection System/Intrusion Prevention System (CIDS/CIPS) instructs switches to block certain clients from accessing the wireless network when attacks involving these clients are detected at Layer 3 through Layer 7. This system offers significant network protection by helping to detect, classify, and stop threats including worms, spyware/adware, network viruses, and application abuse. Two methods are available to detect potential attacks:
IDS sensors can be configured to detect various types of IP-level attacks in the network. When the sensors identify an attack, they can alert the switch to shun the offending client. When a new IDS sensor is added, the IDS sensor should be registered with the switch so that the switch can query the sensor to get the list of shunned clients.
When an IDS sensor detects a suspicious client, it alerts the switch to shun this client. The shun entry is distributed to all switches within the same mobility group. If the client to be shunned is currently joined to a switch in this mobility group, the anchor switch adds this client to the dynamic exclusion list, and the foreign switch removes the client. The next time that the client tries to connect to a switch, the anchor switch rejects the handoff and informs the foreign switch that the client is being excluded.
How to Configure Intrusion Detection System
Configuring IDS Sensors
| ||Command or Action||Purpose|
Device# configure terminal
Enters global configuration mode.
Device(config)# wireless wps cids-sensor 2 126.96.36.199 admin pwd123
Configures the IDS sensors that holds and internal index number. The index parameter determines the sequence in which the controller consults the IDS sensors. The controller supports up to five IDS sensors. |
ip-address– [optional] Provide the IP address for the IDS.
username– [optional] Configures the username for the IDS.
password– [optional] Configures the password for the respective username.
Device(config)# wireless wps cids-sensor 1
Enters the IDS configuration submode.
Configures various IDS parameters.|
default– [optional] Sets a command to its default.
exit– [optional] Exits the submode.
fingerprint– [optional] Configures the sensor's TLS fingerprint.
interval– [optional] Configures the sensor's query interval. The range is between 10-3600 seconds.
no– [optional] Negates a command or set its defaults.
port– [optional] Configures the sensor's port number.
shutdown– [optional] Shuts down the intrusion detection sensor.
Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.
Monitoring Intrusion Detection System
Table 1 Commands for Monitoring Wireless Multicast
| show wireless wps cids-sensor index
|| Displays the IDS configuration of the IDS sensor with the mentioned index value.
| show wireless wps cids-sensor summary
|| Displays the list of all the configured IDS with their respective values like index, ip-address, port number, interval value, status and last query.
|show wireless wps shun-list
|| Displays the list of the IDS shun list.