Dell PowerConnect W-Airwave W-Airwave 7.2 Configuration Guide - Page 78

General Settings, Other Settings and AP SNMP User Profiles, pencil, Details

Page 78 highlights

Select the Add button to create a new IDS profile, or click the pencil icon next to an existing profile to edit. The Details page appears. Complete the settings as described in Table 27: Table 26 Profiles > IDS > General Profile Settings Field Default Description General Settings Folder Name Top Blank Set the folder with which the profile is associated. The drop-down menu displays all folders available for association with the profile. Enter the name of the profile. Other Settings and AP SNMP User Profiles IDS Unauthorized Device Profile default IDS Signature Matching Profile default IDS General Profile default IDS Impersonation default Profile IDS DoS Profile default Select the IDS Unauthorized Device Profile from the drop-down menu. This profile is referenced by the overriding IDS profile currently being configured. The drop-down menu contains any profiles that you have configured. To create a new profile of this type, click the add icon. To edit an existing profile, select that profile then click the pencil icon. For additional information about configuring IDS Unauthorized Device Profiles, refer to "Profiles > IDS > Unauthorized Device" on page 86. Select the IDS Signature Matching Profile from the drop-down menu. The drop-down menu lists all signature matching profiles that are currently configured and available. To create a new profile of this type, click the add icon. To edit an existing profile, select that profile then click the pencil icon. For additional information about configuring IDS Unauthorized Device Profiles, refer to "Profiles > IDS > Signature Matching" on page 80. Select the IDS General Profile from the drop-down menu. The drop-down menu lists all General IDS profiles that are currently configured and available. To create a new profile of this type, click the add icon. To edit an existing profile, select that profile then click the pencil icon. For additional information about configuring IDS Unauthorized Device Profiles, refer to "Profiles > IDS > General" on page 79. Select the IDS Impersonation Profile from the drop-down menu. The drop-down menu lists all such profiles that are currently configured and available. To create a new profile of this type, click the add icon. To edit an existing profile, select that profile then click the pencil icon. For additional information about configuring IDS Impersonation Profiles, refer to "Profiles > IDS > Impersonation" on page 85. Select the IDS Impersonation Profile from the drop-down menu. The drop-down menu lists all such profiles that are currently configured and available. To create a new profile of this type, click the add icon. To edit an existing profile, select that profile then click the pencil icon. For additional information about configuring IDS Impersonation Profiles, refer to "Profiles > IDS > Denial of Service" on page 81. 4. Select the profile type to view or configure:  General-Configures general AP attributes. Refer to "Profiles > IDS > General" on page 79.  Signature Matching-Configures signatures and signature matching for intrusion detection. Refer to "Profiles > IDS > Signature Matching" on page 80.  Signature-Defines a predefined signature. Refer to "Profiles > IDS > Signature Matching > Signature" on page 81.  Denial of Service-Configures traffic anomaly settings for Denial of Service (DoS) attacks. Refer to "Profiles > IDS > Impersonation" on page 85. 78 | Dell PowerConnect W Configuration Reference Dell PowerConnect W AirWave 7.2 | Configuration Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160

78
|
Dell PowerConnect W Configuration Reference
Dell PowerConnect W AirWave 7.2
| Configuration Guide
Select the
Add
button to create a new
IDS
profile, or click the
pencil
icon next to an existing profile to edit. The
Details
page appears. Complete the settings as described in
Table 27
:
4.
Select the profile type to view or configure:
General
—Configures general AP attributes. Refer to
“Profiles > IDS > General” on page 79
.
Signature Matching
—Configures signatures and signature matching for intrusion detection. Refer to
“Profiles
> IDS > Signature Matching” on page 80
.
Signature
—Defines a predefined signature. Refer to
“Profiles > IDS > Signature Matching > Signature”
on page 81
.
Denial of Service
—Configures traffic anomaly settings for Denial of Service (DoS) attacks. Refer to
“Profiles
> IDS > Impersonation” on page 85
.
Table 26
Profiles > IDS > General Profile Settings
Field
Default
Description
General Settings
Folder
Top
Set the folder with which the profile is associated. The drop-down menu displays all
folders available for association with the profile.
Name
Blank
Enter the name of the profile.
Other Settings and AP SNMP User Profiles
IDS Unauthorized
Device Profile
default
Select the IDS Unauthorized Device Profile from the drop-down menu. This profile is
referenced by the overriding IDS profile currently being configured. The drop-down
menu contains any profiles that you have configured.
To create a new profile of this type, click the add icon. To edit an existing profile, select
that profile then click the pencil icon.
For additional information about configuring IDS Unauthorized Device Profiles, refer to
“Profiles > IDS > Unauthorized Device” on page 86
.
IDS Signature
Matching Profile
default
Select the IDS Signature Matching Profile from the drop-down menu. The drop-down
menu lists all signature matching profiles that are currently configured and available.
To create a new profile of this type, click the add icon. To edit an existing profile, select
that profile then click the pencil icon.
For additional information about configuring IDS Unauthorized Device Profiles, refer to
“Profiles > IDS > Signature Matching” on page 80
.
IDS General Profile
default
Select the IDS General Profile from the drop-down menu. The drop-down menu lists all
General IDS profiles that are currently configured and available.
To create a new profile of this type, click the add icon. To edit an existing profile, select
that profile then click the pencil icon.
For additional information about configuring IDS Unauthorized Device Profiles, refer to
“Profiles > IDS > General” on page 79
.
IDS Impersonation
Profile
default
Select the IDS Impersonation Profile from the drop-down menu. The drop-down menu
lists all such profiles that are currently configured and available.
To create a new profile of this type, click the add icon. To edit an existing profile, select
that profile then click the pencil icon.
For additional information about configuring IDS Impersonation Profiles, refer to
“Profiles > IDS > Impersonation” on page 85
.
IDS DoS Profile
default
Select the IDS Impersonation Profile from the drop-down menu. The drop-down menu
lists all such profiles that are currently configured and available.
To create a new profile of this type, click the add icon. To edit an existing profile, select
that profile then click the pencil icon.
For additional information about configuring IDS Impersonation Profiles, refer to
“Profiles > IDS > Denial of Service” on page 81
.