This article mainly describes security analysis, switch wireless and wired intrusion detection, switch wireless and wired intrusion detection. Different tools require a different system. Most people agree that in an idealized world, a network administrator can manage a wired LAN and a wireless LAN, using the same approach. Then, in reality, when the protocols for each network are different, such as Wi-Fi and Ethernet, achieving these goals will become challenging. Similar to the multicast (multicast) and quality of Service (QoS) features described earlier in this article, intrusion detection and prevention systems work differently on the wired and wireless side of the Enterprise Ethernet switch. The wireless intrusion detection and Prevention system (WIDS/WIPS) uses the second layer protocol (Layer 2) to view Wi-Fi clients and wireless access nodes (APS). This system identifies illegal (unauthorized) devices that attempt to connect to network resources and monitors potential attacks that the Wi-Fi protocol may receive. This type of attack may be initiated by a hacker who instructs the client to disconnect the AP illegally or maliciously connect the illegal device. Since there is no actual physical cable, this exploit behavior can occur at the RF (RF) Physical link layer (Layer 1) and may be intentional or unintentional. RF Jammers can cause thorough service resolution. Other interfering factors, such as microwave ovens, wireless cameras, cordless phones, interference with the same channel, etc., may cause minor harm, will not affect performance, but may also bring enough interference, so that the entire wireless LAN can not work properly. The first layer of monitoring and grading of jamming devices is often referred to as "spectral analysis" rather than WIPS. The role of spectral analysis, relative to performance and troubleshooting, is not related to security. For wired Ethernet, the traditional IPs runs on the upper layer of the network, focusing on security. These intrusion detection and defense systems can seize attacks on IP protocols, applications, or operating systems. The anti-virus software on the laptop can work in conjunction with the IPs software in the WAN access router, possibly in some parts of the wired network, together monitoring the information flow of the wired network, looking for malicious or suspicious identification. Once found, these identities are quarantined or removed from the network. All in all, although similar names are used for IPs systems, the meanings of these words may be different, depending on where they are used, whether they are on the RF or Ethernet side of the network. This means that, for the time being, these features must be individually configured and maintained, often using a different management panel. The above related content is the security analysis: Switch wireless and wired intrusion detection description, hopefully will give you some help in this regard. 498) this.width=498 ' OnMouseWheel = ' javascript:return big (This) ' style= ' width:576px; Height:367px "height=" 367 "alt=" Security analysis switch wireless and wired intrusion Detection "width=" 576 "srcwidth=" 576 "srcheight=" 367 "zoomrate=" 1 "src=" http ://images.51cto.com/files/uploadimg/20100915/1427360.jpg "/> Above the relevant content is the security analysis: Switch wireless and wired intrusion detection introduction, hope you can have some harvest." "Editorial recommendations" through the actual combat email Security Analysis Hacker contest: Safety analyst Miller thinks Apple system least secure Hacker Resources Web site Program Security Analyzer VB source code security Analysis: Small and medium-sized Enterprises Network security Analysis of the current situation of security: small and medium-sized Enterprises network security Status Analysis "editor: Sun Chaohua TEL: (010) 68476606 "Original: Description of wireless and wired intrusion detection for security analysis switch back to network security home
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.