Dell W-Series 334 Instant 6.5.1.0-4.3.1.0 User Guide - Page 334
Configuring IDS, The IDS policy for W-IAPs can be created using the CLI., To con IDS using CLI
View all Dell W-Series 334 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 334 highlights
Configuring IDS The IDS policy for W-IAPs can be created using the CLI. To configure IDS using CLI: (Instant AP)(config)# ids (Instant AP)(IDS)# infrastructure-detection-level (Instant AP)(IDS)# client-detection-level (Instant AP)(IDS)# infrastructure-protection-level (Instant AP)(IDS)# client-protection-level (Instant AP)(IDS)# wireless-containment (Instant AP)(IDS)# wired-containment (Instant AP)(IDS)# wired-containment-ap-adj-mac (Instant AP)(IDS)# wired-containment-susp-l3-rogue (Instant AP)(IDS)# detect-ap-spoofing (Instant AP)(IDS)# detect-windows-bridge (Instant AP)(IDS)# signature-deauth-broadcast (Instant AP)(IDS)# signature-deassociation-broadcast (Instant AP)(IDS)# detect-adhoc-using-valid-ssid (Instant AP)(IDS)# detect-malformed-large-duration (Instant AP)(IDS)# detect-ap-impersonation (Instant AP)(IDS)# detect-adhoc-network (Instant AP)(IDS)# detect-valid-ssid-misuse (Instant AP)(IDS)# detect-wireless-bridge (Instant AP)(IDS)# detect-ht-40mhz-intolerance (Instant AP)(IDS)# detect-ht-greenfield (Instant AP)(IDS)# detect-ap-flood (Instant AP)(IDS)# detect-client-flood (Instant AP)(IDS)# detect-bad-wep (Instant AP)(IDS)# detect-cts-rate-anomaly (Instant AP)(IDS)# detect-rts-rate-anomaly (Instant AP)(IDS)# detect-invalid-addresscombination (Instant AP)(IDS)# detect-malformed-htie (Instant AP)(IDS)# detect-malformed-assoc-req (Instant AP)(IDS)# detect-malformed-frame-auth (Instant AP)(IDS)# detect-overflow-ie (Instant AP)(IDS)# detect-overflow-eapol-key (Instant AP)(IDS)# detect-beacon-wrong-channel (Instant AP)(IDS)# detect-invalid-mac-oui (Instant AP)(IDS)# detect-valid-clientmisassociation (Instant AP)(IDS)# detect-disconnect-sta (Instant AP)(IDS)# detect-omerta-attack (Instant AP)(IDS)# detect-fatajack (Instant AP)(IDS)# detect-block-ack-attack (Instant AP)(IDS)# detect-hotspotter-attack (Instant AP)(IDS)# detect-unencrypted-valid (Instant AP)(IDS)# detect-power-save-dos-attack (Instant AP)(IDS)# detect-eap-rate-anomaly (Instant AP)(IDS)# detect-rate-anomalies (Instant AP)(IDS)# detect-chopchop-attack (Instant AP)(IDS)# detect-tkip-replay-attack (Instant AP)(IDS)# signature-airjack (Instant AP)(IDS)# signature-asleap (Instant AP)(IDS)# protect-ssid (Instant AP)(IDS)# rogue-containment (Instant AP)(IDS)# protect-adhoc-network (Instant AP)(IDS)# protect-ap-impersonation (Instant AP)(IDS)# protect-valid-sta (Instant AP)(IDS)# protect-windows-bridge (Instant AP)(IDS)# end (Instant AP)# commit apply Dell Networking W-Series Instant 6.5.1.0-4.3.1.0 | User Guide Intrusion Detection | 334