Reference Guide

Table Of Contents
Dell PowerConnect ArubaOS 6.0 Command Line Interface | Reference Guide ids dos-profile | 218
Usage Guidelines
DoS attacks are designed to prevent or inhibit legitimate clients from accessing the network. This includes
blocking network access completely, degrading network service, and increasing processing load on clients and
network equipment.
Example
The following command enables a detection in the DoS profile named “floor2”:
(host) (config) #ids dos-profile floor2
(host) (IDS Denial Of Service Profile "floor2") detect-ap-flood
Command History
Deprecated Predefined Profiles
Deprecated DOS profile:
z ids-dos-disabled
z ids-dos-low-setting
z ids-dos-medium-setting
z ids-dos-high-setting
Command Information
rts-rate-threshold Number of RTS control packets over the time
interval that constitutes an anomaly.
0-100000 5000
rts-rate-time-interval Time interval, in seconds, over which the packet
count should be checked.
1-120
seconds
5 seconds
spoofed-deauth-blacklist Enables detection of a deauth attack initiated
against a client associated to an AP. When such
an attack is detected, the client is quarantined
from the network to prevent a man-in-the-middle
attack from being successful.
true
false
false
tkip-replay-quiet-time Time to wait, in seconds, after detecting a TKIP
replay attack after which the check can be
resumed.
60-360000
seconds
900
seconds
Release Modification
ArubaOS 3.0 Command Introduced.
ArubaOS 3.3 Updated with support for high-throughput IEEE 802.11n standard.
ArubaOS 3.4 detect-disconnect-sta and disconnect-sta-quiet-time parameters deprecated.
ArubaOS 6.0 Deprecated predefined profiles and added numerous DoS profile options
Platform License Command Mode
Available on all platforms Requires the RFprotect license Config mode on master
controllers
Parameter Description Range Default