• Understanding Channels to Monitor and Defend

 
 
Print Friendly, PDF & Email

Introduction

Arista Wi-Fi Devices are capable of operating in ‘AP with Background Scanning’ mode as well as a ‘Sensor’ mode for Wireless Intrusion Prevention System (WIPS) functionality. These modes are useful in scanning and defending the RF medium and it is important to understand the use of Channels to Monitor and Channels to Defend in this context. The channels are selected based on the Wi-Fi regulatory domain of the country where the devices have been deployed.

Arista Wi-Fi Devices can scan the RF medium on any channel to detect Wi-Fi threats, but can perform threat mitigation or prevention only on the selected channels to defend.

Prerequisites

  • An understanding of AP and Sensor modes, and the capabilities of the different device models. Please refer to the datasheets: Cognitive Wi-Fi Datasheets

Solution

Channel settings are divided into two categories:

  • Channels to Monitor
  • Channels to Defend

On CloudVision Wi-Fi, channel settings  can be found under Configure > Wi-Fi > Device Settings.

In AP mode, Channels to Monitor are used by the device if one or more radios have Background Scanning enabled. This can be verified on the Device Settings screen.

In Sensor mode, the device scans all channels by default. The channels shown in the Channels to Monitor section are based on the Wi-Fi Regulatory Domain selected on the Radio Settings screen.

The channels selected in the Channels to Defend section are also based on the Wi-Fi Regulatory Domain.

The Channels to Defend section will decide the RF channels on which the Sensor can initiate prevention if malicious Wi-Fi activity is detected.

Wi-Fi threats to be prevented can be selected by navigating to Configure > WIPS > Automatic Intrusion Prevention.

These channel settings can also be configured on Wireless Manager, by navigating to Configuration > Device Configuration > Device Template. Then select a Device Template and go to Device Settings > Channels Settings.

Please see the article How to troubleshoot ineffective intrusion prevention for more details on WIPS prevention.

Follow

Get every new post on this blog delivered to your Inbox.

Join other followers: