Dell PowerConnect W-IAP92 Dell Instant 6.1.3.4-3.1.0.0 User Guide - Page 167

Table 27, Table 26

Page 167 highlights

Table 26 Infrastructure Detection Policies (Continued) Detection Level Detection Policy High  Detect AP Impersonation  Detect Adhoc Networks  Detect Valid SSID Misuse  Detect Wireless Bridge  Detect 802.11 40MHz intolerance settings  Detect Active 802.11n Greenfield Mode  Detect AP Flood Attack  Detect Client Flood Attack  Detect Bad WEP  Detect CTS Rate Anomaly  Detect RTS Rate Anomaly  Detect Invalid Address Combination  Detect Malformed Frame- HT IE  Detect Malformed Frame- Association Request  Detect Malformed Frame- Auth  Detect Overflow IE  Detect Overflow EAPOL Key  Detect Beacon Wrong Channel  Detect devices with invalid MAC OUI The following table describes the detection policies that are enabled in Client Detection Custom settings field. Table 27 Client Detection Policies Detection Level Off Low Medium High Detection Policy All detection policies are disabled.  Detect Valid Station Mis association  Detect Disconnect Station Attack  Detect Omerta Attack  Detect FATA-Jack Attack  Detect Block ACK DOS  Detect Hotspotter Attack  Detect unencrypted Valid Client  Detect Power Save DOS Attack  Detect EAP Rate Anomaly  Detect Rate Anomaly  Detect Chop Chop Attack  Detect TKIP Replay Attack  IDS Signature- Air Jack  IDS Signature- ASLEAP Dell PowerConnect W-Series Instant Access Point 6.1.3.4-3.1.0.0 | User Guide Intrusion Detection System | 167

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246

Dell PowerConnect W-Series Instant Access Point 6.1.3.4-3.1.0.0
| User Guide
Intrusion Detection System
|
167
The following table describes the detection policies that are enabled in
Client Detection Custom settings field.
High
Detect AP Impersonation
Detect Adhoc Networks
Detect Valid SSID Misuse
Detect Wireless Bridge
Detect 802.11 40MHz intolerance settings
Detect Active 802.11n Greenfield Mode
Detect AP Flood Attack
Detect Client Flood Attack
Detect Bad WEP
Detect CTS Rate Anomaly
Detect RTS Rate Anomaly
Detect Invalid Address Combination
Detect Malformed Frame— HT IE
Detect Malformed Frame— Association Request
Detect Malformed Frame— Auth
Detect Overflow IE
Detect Overflow EAPOL Key
Detect Beacon Wrong Channel
Detect devices with invalid MAC OUI
Table 27
Client Detection Policies
Detection Level
Detection Policy
Off
All detection policies are disabled.
Low
Detect Valid Station Mis association
Medium
Detect Disconnect Station Attack
Detect Omerta Attack
Detect FATA-Jack Attack
Detect Block ACK DOS
Detect Hotspotter Attack
Detect unencrypted Valid Client
Detect Power Save DOS Attack
High
Detect EAP Rate Anomaly
Detect Rate Anomaly
Detect Chop Chop Attack
Detect TKIP Replay Attack
IDS Signature— Air Jack
IDS Signature— ASLEAP
Table 26
Infrastructure Detection Policies
(Continued)
Detection Level
Detection Policy