Admins have recently turned on Wireless IDS/IPS infrastructure detection at the high level on HPE Aruba Networking APs.
When you check WIDS events, you see several RTS rate and CTS rate anomalies, which were triggered by neighboring APs.
What can you interpret from this event?
- These neighboring APs are likely to be wireless clients that are inappropriately bridging their wired and wireless NICs; you should track down and remove them.
- These neighboring APs might be hackers trying to launch a DoS, but are more likely operating normally; you should start by tuning the event thresholds.
- These neighboring APs are actually rogue APs, and you should enable wireless tarpit containment on them.
- These neighboring APs are actually rogue APs, and you should enable wireless de-authentication containment on them.
Answer(s): B
Explanation:
When Wireless IDS/IPS infrastructure detection reports RTS (Request to Send) and CTS (Clear to Send) rate anomalies triggered by neighboring APs, it is often an indication of unusual, but not necessarily malicious, behavior. These anomalies can be caused by neighboring APs operating normally but under specific conditions that trigger the alerts. Before assuming a security threat, it is recommended to tune the event thresholds to better match the environment and reduce false positives. This approach helps to distinguish between normal operations and potential DoS attacks.
Reference:
Aruba's Wireless IDS/IPS configuration guides provide information on interpreting events,
adjusting thresholds, and distinguishing between legitimate and malicious activities in a wireless network environment.
Reveal Solution Next Question