Dell W-Series 334 Instant 6.5.1.0-4.3.1.0 User Guide - Page 331
Detection Level, Detection Policy, Table 67
View all Dell W-Series 334 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 331 highlights
Table 67: Infrastructure Detection Policies Detection Level Detection Policy l Detect W-IAP Flood Attack l Detect Client Flood Attack l Detect Bad WEP l Detect CTS Rate Anomaly l Detect RTS Rate Anomaly l Detect Invalid Address Combination l Detect Malformed Frame-HT IE l Detect Malformed Frame-Association Request l Detect Malformed Frame-Auth l Detect Overflow IE l Detect Overflow EAPOL Key l Detect Beacon Wrong Channel l Detect devices with invalid MAC OUI The following table describes the detection policies enabled in the Client Detection Custom settings text box. Table 68: Client Detection Policies Detection Level Detection Policy Off All detection policies are disabled. Low l Detect Valid Station Misassociation Medium l Detect Disconnect Station Attack l Detect Omerta Attack l Detect FATA-Jack Attack l Detect Block ACK DOS l Detect Hotspotter Attack l Detect unencrypted Valid Client l Detect Power Save DOS Attack High l Detect EAP Rate Anomaly l Detect Rate Anomaly l Detect Chop Chop Attack l Detect TKIP Replay Attack l IDS Signature-Air Jack l IDS Signature-ASLEAP The following levels of detection can be configured in the WIP Protection page: l Off l Low l High 331 | Intrusion Detection Dell Networking W-Series Instant 6.5.1.0-4.3.1.0 | User Guide