<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
    xmlns:content="http://purl.org/rss/1.0/modules/content/"
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>Wi-Fi - WIPS — WatchGuard Community</title>
        <link>https://community.watchguard.com/watchguard-community/</link>
        <pubDate>Mon, 13 Apr 2026 23:11:46 +0000</pubDate>
        <language>en</language>
            <description>Wi-Fi - WIPS — WatchGuard Community</description>
    <atom:link href="https://community.watchguard.com/watchguard-community/categories/wi-fi-wips/feed.rss" rel="self" type="application/rss+xml"/>
    <item>
        <title>RF Signature Anomalies Prevention was AXed!!!!</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/1678/rf-signature-anomalies-prevention-was-axed</link>
        <pubDate>Wed, 10 Mar 2021 20:06:26 +0000</pubDate>
        <category>Wi-Fi - WIPS</category>
        <dc:creator>DefenderX</dc:creator>
        <guid isPermaLink="false">1678@/watchguard-community/discussions</guid>
        <description><![CDATA[<p><strong>WEPGuard</strong> —  means you can also prevent authorized clients with anomalies in their RF signature from connecting to an authorized AP. These RF anomalies can indicate the client is spoofing an authorized inactive client MAC address to gain access to the AP.</p>

<p>I find it hard to understand why a function as important as RF signature anomalies Detection and Prevention was taken out of the Threat Prevention Configuration. I went back through Client Auto-classification as well as the Intrusion Prevention tab located under Configuration to see if there was another way of preventing spoofed clients from joining Authorized AP. To the best of my understanding, there is no setting or configuration that can prevent spoofed clients.  I understand the implementation of the marker packet technology and how it is utilized in the WIPS function of the AP. However, if I cannot dictate or control spoofed clients autonomously what's the point of WatchGuard's WIPS as a Threat Prevention Sensor.</p>

<p>By taking out the RF Signature Anomalies under WEPGuard, I have no access to reset clients RF Signature without deleting them.</p>

<p>I understand that WEP itself is an out of date encryption standard, and having that option removed makes sense. To remove the only option to prevent spoofed clients however does not make sense. Can you please help me understand how Watchguard can protect and prevent all my clients from spoofed malicious attacks.</p>

<p>Thanks, <br />
MGS</p>
]]>
        </description>
    </item>
    <item>
        <title>WIPS on a all WG Wifi network</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/1601/wips-on-a-all-wg-wifi-network</link>
        <pubDate>Sat, 06 Feb 2021 07:39:07 +0000</pubDate>
        <category>Wi-Fi - WIPS</category>
        <dc:creator>user808</dc:creator>
        <guid isPermaLink="false">1601@/watchguard-community/discussions</guid>
        <description><![CDATA[Is there any added benefit in having a dedicated wips device or radio if you are only using wg access points? It seems that the features of wips are designed to add security features that are built into wg APs to non wg APs.]]>
        </description>
    </item>
    <item>
        <title>SSID Blocking MAC Address</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/529/ssid-blocking-mac-address</link>
        <pubDate>Fri, 11 Oct 2019 17:45:41 +0000</pubDate>
        <category>Wi-Fi - WIPS</category>
        <dc:creator>shaazaminator</dc:creator>
        <guid isPermaLink="false">529@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>AP 420 &amp; 325</p>

<p>An authorized WIPS client PC connects to the network via the Secure wifi SSID. <br />
WIPS is disabled.</p>

<p>This morning the PC can’t connect to the secure SSID, but can connect to the open guest SSID.</p>

<p>So I log into Wi-Fi Cloud &gt; Manage &gt; Events to see what is happening with this client. All it says is “Client connected to Authorized Guest AP” and is categorized as “Misbehaving Client” because the Guest SSID is open.  (I find this very annoying btw, but get why it happens) No quarantine (no WIPS running), no reason why it won’t connect.</p>

<p>So I open Discover &gt; Monitor &gt; Clients &gt; click on the three dots of said client and choose the “Disable Auto-Prevention” thinking this would do the trick.</p>

<p>Nope.</p>

<p>Opening the Client Connection Logs in Discover, I see the entry “MAC Filtering The access point denied client authentication because client is not allowed to connect to the SSID.”<br />
My question is How in the heck does one remove the blocked MAC from the SSID? I poked, prodded, pleaded (all the while my end user is standing in my office doorway glaring at me) and couldn’t find a way.</p>

<p>Eventually I ended up whitelisting the client MAC in Discover &gt; Configure &gt; WiFi &gt; Secure SSID &gt; SSID &gt; Access Control &gt; Blacklist and Whitelisting of WiFi Clients.</p>

<p>Now, because of my changes, this particular client is now immune to any WIPS security. Sorta defeating the purpose of WIPS</p>

<p>Is there a better way of handling this? And why was the client’s MAC blocked in the SSID? There were no event entries regarding this, and no suggestions on how to remedy the problem.</p>

<p>Or is it just me?</p>

<ul><li>Doug</li>
</ul>]]>
        </description>
    </item>
    <item>
        <title>Quarantine Authorized Device</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/510/quarantine-authorized-device</link>
        <pubDate>Thu, 03 Oct 2019 17:34:42 +0000</pubDate>
        <category>Wi-Fi - WIPS</category>
        <dc:creator>shaazaminator</dc:creator>
        <guid isPermaLink="false">510@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Watchguard AP 420 &amp; 325 running in Watchguard WiFi Cloud</p>

<p>Per the instructions prior to turning WIPS on, I monitored all the devices on my network and classified each AP and Client as Authorized, External, Guest etc………</p>

<p>Then in Discover &gt; Configure &gt; WIPS I followed the recommended settings for AP Auto-Classification and Client Auto-Classification.</p>

<p>My issue is with an HP MFP device that only connects to our network wirelessly. This device has been classified as Authorized, and connects to an Authorized AP on a secure network. When I turn WIPS on this device is labeled as Rogue and thrown into Quarantine, making it unusable. On HP’s newer MFP’s there is a Network Setting called WiFi Direct, which allows smart devices to connect and print without having to be on the network. WIPS thinks this is a MITM attack, which I understand, but even after disabling this feature and re-classifying the device as Authorized, WIPS still quarantines it.</p>

<p>I have pushed every button and link in both the Discover &amp; Manage sites to solve this without any luck. Even now I still see this Event:</p>

<p>Authorized] client [HP23383E] is running a Soft Mobile Hotspot AP or a Windows 7 Virtual AP</p>

<p>Any ideas anyone?</p>

<p>IMHO, Watchguard has made this very confusing having two different sites (Discover &amp; Manage) to administer your wireless network. Once can turn WIPS on and off in both sites, Classify AP’s and Clients in both sites, monitor events and security alerts in both sites and more. Does one site take precedence over the other?<br />
Thanks!</p>

<ul><li>Doug</li>
</ul>]]>
        </description>
    </item>
   </channel>
</rss>
