Dell PowerConnect W-Airwave W-Airwave 7.2 Configuration Guide - Page 85

Profiles > IDS > Impersonation, General Settings, Other Settings

Page 85 highlights

2. Select the Add button to create a new Rate Threshold, or click the pencil icon next to an existing threshold to edit. The Details page appears. Complete the settings as described in Table 32: Table 32 Profiles > IDS > Denial of Service, Rate Threshold Settings Field Default Description General Settings Folder Name Top Blank Set the folder with which the profile is associated. The drop-down menu displays all folders available for association with the profile. Enter the name of the rate threshold profile. Other Settings Channel Increase Time 15 (0--360000 sec) Channel Quiet Time 900 (60-360000 sec) Channel Threshold (0- 300 100000) Node Time Interval (1- 15 120 sec) Node Quiet Time 900 (60-360000 sec) Node Threshold 200 (0-100000) Set the time, in seconds, in which the threshold must be exceeded in order to trigger an alarm. Set the time that must elapse before another identical alarm may be triggered, after an alarm has been triggered, Use this option to prevent excessive messages in the log file. Specify the number of a specific type of frame. This number must be exceeded within a specific interval in an entire channel to trigger an alarm. Set the time, in seconds, in which the threshold must be exceeded in order to trigger an alarm. Set the time that must elapse before another identical alarm may be triggered, after an alarm has been triggered. This option prevents excessive messages in the log file. Specify the number of a specific type of frame that must be exceeded within a specific interval for a particular client MAC address to trigger an alarm. 3. Select Add or Save. The added or edited Rate Threshold appears on the Profiles > IDS > Denial of Service > Rate Thresholds page. Profiles > IDS > Impersonation Perform these steps to create IDS Impersonation profiles. 1. Select Profiles > IDS > Impersonation in the Dell PowerConnect W Navigation pane. 2. Select the Add button to create a new Impersonation profile, or click the pencil icon next to an existing profile to edit. The Details page appears. Complete the settings as described in Table 33: Table 33 Profiles > IDS > Impersonation Settings Field Default Description General Settings Folder Name Other Settings Detect AP Impersonation Top Blank Set the folder with which the profile is associated. The drop-down menu displays all folders available for association with the profile. Enter the name of the impersonation profile. Yes Enable or disable detection of AP impersonation. In AP impersonation attacks, the attacker sets up an AP that assumes the BSSID and ESSID of a valid AP. AP impersonation attacks can be done for man-in-the-middle attacks, a rogue AP attempting to bypass detection, or a honeypot attack. Dell PowerConnect W AirWave 7.2 | Configuration Guide Dell PowerConnect W Configuration Reference | 85

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160

Dell PowerConnect W AirWave 7.2
| Configuration Guide
Dell PowerConnect W Configuration Reference
|
85
2.
Select the
Add
button to create a new
Rate Threshold
, or click the
pencil
icon next to an existing threshold to
edit. The
Details
page appears. Complete the settings as described in
Table 32
:
3.
Select
Add
or
Save
.
The added or edited
Rate Threshold
appears on the
Profiles > IDS > Denial of Service
> Rate Thresholds
page.
Profiles > IDS > Impersonation
Perform these steps to create IDS
Impersonation
profiles.
1.
Select
Profiles > IDS > Impersonation
in the
Dell PowerConnect W Navigation
pane.
2.
Select the
Add
button to create a new
Impersonation
profile
,
or click the
pencil
icon next to an existing
profile to edit. The
Details
page appears. Complete the settings as described in
Table 33
:
Table 32
Profiles > IDS > Denial of Service, Rate Threshold Settings
Field
Default
Description
General Settings
Folder
Top
Set the folder with which the profile is associated. The drop-down menu displays all
folders available for association with the profile.
Name
Blank
Enter the name of the rate threshold profile.
Other Settings
Channel Increase Time
(0--360000 sec)
15
Set the time, in seconds, in which the threshold must be exceeded in order to trigger an
alarm.
Channel Quiet Time
(60-360000 sec)
900
Set the time that must elapse before another identical alarm may be triggered, after an
alarm has been triggered, Use this option to prevent excessive messages in the log file.
Channel Threshold
(0-
100000)
300
Specify the number of a specific type of frame. This number must be exceeded within a
specific interval in an entire channel to trigger an alarm.
Node Time Interval
(1-
120 sec)
15
Set the time, in seconds, in which the threshold must be exceeded in order to trigger an
alarm.
Node Quiet Time
(60-360000 sec)
900
Set the time that must elapse before another identical alarm may be triggered, after an
alarm has been triggered. This option prevents excessive messages in the log file.
Node Threshold
(0-100000)
200
Specify the number of a specific type of frame that must be exceeded within a specific
interval for a particular client MAC address to trigger an alarm.
Table 33
Profiles > IDS > Impersonation Settings
Field
Default
Description
General Settings
Folder
Top
Set the folder with which the profile is associated. The drop-down menu displays all folders
available for association with the profile.
Name
Blank
Enter the name of the impersonation profile.
Other Settings
Detect AP
Impersonation
Yes
Enable or disable detection of AP impersonation. In AP impersonation attacks, the attacker
sets up an AP that assumes the BSSID and ESSID of a valid AP. AP impersonation attacks
can be done for man-in-the-middle attacks, a rogue AP attempting to bypass detection, or a
honeypot attack.