WLAN services are available in public places, such as banks and airports. Users can connect to the WLANs after associating with corresponding SSIDs. If a rogue AP is deployed and provides spoofing SSIDs similar to authorized SSIDs, the users may be misled and connect to the rogue AP, which brings security risks. To address this problem, configure a fuzzy matching rule to identify spoofing SSIDs. The device compares a detected SSID with the matching rule. If the SSID matches the rule, the SSID is considered a spoofing SSID. The AP using the spoofing SSID is a rogue AP. After rogue AP containment is configured, the device contains the rogue AP and disconnects users from the spoofing SSID.
The system view is displayed.
The WLAN view is displayed.
A WIDS spoof SSID profile is created and the WIDS spoof SSID profile view is displayed.
By default, the system has a default WIDS spoof SSID profile default.
The fuzzy matching rule is configured for spoofing SSIDs.
By default, no fuzzy matching rule is configured for spoofing SSIDs.
Return to the WLAN view.
The WIDS profile view is displayed.
The WIDS spoof SSID profile is applied to the WIDS profile.
By default, the WIDS spoof SSID profile default is bound to a WIDS profile.