Dell PowerConnect W-IAP92 Dell Instant 6.2.0.0-3.2.0.0 User Guide - Page 179

Custom settings

Page 179 highlights

Detection Level Detection Policy l Detect Client Flood Attack l Detect Bad WEP l Detect CTS Rate Anomaly l Detect RTS Rate Anomaly l Detect Invalid Address Combination l Detect Malformed Frame- HT IE l Detect Malformed Frame- Association Request l Detect Malformed Frame- Auth l Detect Overflow IE l Detect Overflow EAPOL Key l Detect Beacon Wrong Channel l Detect devices with invalid MAC OUI The following table describes the detection policies that are enabled in the Client Detection Custom settings field. Table 26 - Client Detection Policies Detection Level Detection Policy Off All detection policies are disabled. Low Medium l Detect Valid Station Misassociation l Detect Disconnect Station Attack l Detect Omerta Attack l Detect FATA-Jack Attack l Detect Block ACK DOS l Detect Hotspotter Attack l Detect unencrypted Valid Client l Detect Power Save DOS Attack l Detect EAP Rate Anomaly l Detect Rate Anomaly High l Detect Chop Chop Attack l Detect TKIP Replay Attack l IDS Signature- Air Jack l IDS Signature- ASLEAP Three levels of detection can be configured in the WIP Protection page- Off, Low, and High (as shown in Figure 128). Dell PowerConnect W-Series Instant Access Point 6.2.0.0-3.2.0.0 | User Guide 179 | Intrusion Detection System

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296

Detection Level
Detection Policy
l
Detect Client Flood Attack
l
Detect Bad WEP
l
Detect CTS Rate Anomaly
l
Detect RTS Rate Anomaly
l
Detect Invalid Address Combination
l
Detect Malformed Frame— HT IE
l
Detect Malformed Frame— Association
Request
l
Detect Malformed Frame— Auth
l
Detect Overflow IE
l
Detect Overflow EAPOL Key
l
Detect Beacon Wrong Channel
l
Detect devices with invalid MAC OUI
The following table describes the detection policies that are enabled in the Client Detection
Custom settings
field.
Detection Level
Detection Policy
Off
All detection policies are disabled.
Low
l
Detect Valid Station Misassociation
Medium
l
Detect Disconnect Station Attack
l
Detect Omerta Attack
l
Detect FATA-Jack Attack
l
Detect Block ACK DOS
l
Detect Hotspotter Attack
l
Detect unencrypted Valid Client
l
Detect Power Save DOS Attack
High
l
Detect EAP Rate Anomaly
l
Detect Rate Anomaly
l
Detect Chop Chop Attack
l
Detect TKIP Replay Attack
l
IDS Signature— Air Jack
l
IDS Signature— ASLEAP
Table 26
- Client Detection Policies
Three levels of detection can be configured in the WIP Protection page—
Off
,
Low
, and
High
(as
shown in
Figure
128
)
.
Dell PowerConnect W-Series Instant Access Point
6.2.0.0-3.2.0.0
|
User Guide
179
|
Intrusion Detection System