Intrusion Detection

The IDSIntrusion Detection System. IDS monitors a network or systems for malicious activity or policy violations and reports its findings to the management system deployed in the network. is a feature that monitors the network for the presence of unauthorized Instant APs and clients. It also logs information about the unauthorized Instant APs and clients, and generates reports based on the logged information.

The IDSIntrusion Detection System. IDS monitors a network or systems for malicious activity or policy violations and reports its findings to the management system deployed in the network. feature in the Instant network enables you to detect rogue Instant APs, interfering Instant APs, and other devices that can potentially disrupt network operations.

This chapter describes the following procedures:

Detecting and Classifying Rogue Instant APs

OS Fingerprinting

Configuring WIP and Detection Levels

Configuring IDS