The IDS Settings section provides options for configuring wireless intrusion detection on the internal wireless network. These settings include controls for identifying rogue access points, specifying trusted access points, and scheduling IDS scans. Together, they support the detection of unauthorized devices and enhance the security of the wireless environment.
To configure IDS Settings
From the Authorized Access Points drop-down menu, select the MAC address object group.
A MAC address object group is a collection of MAC addresses grouped together so they can be managed as a single object. In wireless intrusion detection, this group is typically used to define trusted access points. The device compares detected AP MAC addresses against this group to identify unauthorized or rogue access points.
To create a new address group, select Create new MAC address object group. For more information, refer to Creating a MAC Address Object Group.
In the IDS Settings section, select the schedule for the IDS scan from the Schedule IDS Scan drop-down menu. By default, the schedule ID scan is disabled.
To create a new schedule, select Create New Schedule. For more information, refer to Creating an IDS Scan Schedule.
To create a new schedule
From the Schedule IDS Scan drop-down menu, select Create New Schedule.
Select the one pf the following Schedule Type:
Additional fields appear for scheduling a repeating event.
Under Select Day, choose one or more days for the scan, or select Select All.
Enter a Start Time and a Stop Time using 24‑hour format.
Select Add to include the schedule in the Schedule List.
To delete an entry, select Delete this Schedule on the corresponding row.
To remove all entries, select Delete All at the top of the list.
All fields for both Once and Recurring scheduling are available.