SonicOS 7.0 Access Points
- SonicOS7.0
- About Access Points
- Settings
- Synchronize Access Points
- Provisioning Overview
- Creating/Modifying Provisioning Profiles
- Adding/Editing a Provisioning Profile - Getting Started
- General Settings for Provisioning Profiles
- 5GHz/2.4GHz Radio Basic Settings for Provisioning Profiles
- 5GHz/2.4GHz Radio Advanced Settings for Provisioning Profiles
- Sensor Settings for WIDP in Provisioning Profiles
- Mesh Network Settings for Provisioning Profiles
- 3G/4G/LTE WWAN Settings for Provisioning Profiles
- Bluetooth LE Settings for Provisioning Profiles
- Deleting Access Point Profiles
- Product Specific Configuration Notes
- Managing Access Point Objects
- Firmware Management
- Floor Plan View
- Station Status
- Intrusion Detection Services
- Advanced IDP
- Packet Capture
- Virtual Access Points
- RF Monitoring
- RF Analysis
- RF Spectrum
- FairNet
- Wi-Fi Multimedia
- 3G/4G/LTE WWAN
- Bluetooth LE Devices
- Radio Management
- SonicWall Support
Advanced IDP
Advanced Intrusion Detection and Prevention (IDP), or Wireless Intrusion Detection and Prevention (WIDP), located at DEVICE | Access Points > Advanced IDP, monitors the radio spectrum for presence of unauthorized devices (intrusion detection) and to take countermeasures automatically (intrusion prevention) according to administrator settings. When Advanced IDP is enabled on an access point, the radio functions as a dedicated IDP sensor.
When Advanced IDP is enabled on a SonicWall access point radio, its access point functions are disabled and any wireless clients are disconnected.
SonicOS Wireless Intrusion Detection and Prevention is based on SonicPoint and SonicWave access points cooperating with a SonicWall gateways. This feature turns your access points into dedicated WIDP sensors that detect unauthorized access points connected to a SonicWall network. This includes detection of KRACK Man-in-the-Middle access points.
A SonicPoint N configured as a WIDP sensor cannot function as an access point.
When an access point is identified as a rogue access point, its MAC address is added to the All Rogue Access Points address object group.
Was This Article Helpful?
Help us to improve our support portal