Release Notes
371 | ids dos-profile Dell Networking W-Series ArubaOS 6.4.x| Reference Guide
Parameter Description Range Default
power-save-dos-threshold
The Power Management ON
packets sent by a station as a
percentage of the Power
Management OFF packets
sent, in intervals of 10 second,
which will trigger this event.
1- 100 % 80%
probe-request-rate-thresholds
Rate threshold for probe
request frames.
— —
probe-response-rate-thresholds
Rate threshold for probe
response frames.
— —
rts-rate-quiet-time
Time to wait, in seconds, after
detecting an RTS rate anomaly
after which the check can be
resumed.
60-360000
seconds
900
seconds
rts-rate-threshold
Number of RTS control
packets over the time interval
that constitutes an anomaly.
0-100000 5000
rts-rate-time-interval
Time interval, in seconds, over
which the packet count should
be checked.
1-120 seconds 5
seconds
spoofed-deauth-blacklist
Enables detection of a deauth
attack initiated against a client
associated to an AP. When
such an attack is detected, the
client is quarantined from the
network to prevent a man-in-
the-middle attack from being
successful.
true
false
false
tkip-replay-quiet-time
Time to wait, in seconds, after
detecting a TKIP replay attack
after which the check can be
resumed.
60-360000
seconds
900
seconds
Usage Guidelines
DoS attacks are designed to prevent or inhibit legitimate clients from accessing the network. This includes
blocking network access completely, degrading network service, and increasing processing load on clients and
network equipment.
Example
The following command enables a detection in the DoS profile named “floor2”:
(host) (config) #ids dos-profile floor2
(host) (IDS Denial Of Service Profile "floor2") detect-ap-flood










