Reference Guide

0511587-03 | September 2014 Dell Networking W-Series Instant 6.4.2.0-4.1.1 | CLI Reference Guide
Syntax
Parameter Description Range Default
ids
Creates an IDS policy
client-detection-level
<type>
Sets the client detection level. off, low,
medium, high
off
client-protection-level
<type>
Sets the client protection level. off, low,
medium, high
off
detect-adhoc-network
Enables detection of adhoc networks.
detect-ap-flood
Enables detection of flooding with fake
W-IAP beacons to confuse the legitimate
users and to increase the amount of
processing needed on client operating
systems.
detect-ap-impersonation
Enables detection of AP impersonation.
In AP impersonation attacks, the attacker
sets up an AP that assumes the BSSID
and ESSID of a valid AP. AP
impersonation attacks can be done for
man-in-the-middle attacks, a rogue AP
attempting to bypass detection, or a
honeypot attack.
detect-ap-spoofing
Enables AP Spoofing detection.
detect-bad-wep
Enables detection of WEP initialization
vectors that are known to be weak and/or
repeating. A primary means of cracking
WEP keys is to capture 802.11 frames
over an extended period of time and
search for implementations that are still
used by many legacy devices.
detect-beacon-wrong-
channel
Enables detection of beacons advertising
the incorrect channel.
detect-block-ack-attack
Enables detection of attempts to reset
traffic receive windows using the forged
Block ACK Add messages.
detect-chopchop-attack
Enables detection of ChopChop attack.
detect-client-flood
Enables detection of client flood attack.
detect-cts-rate-anomaly
Enables detection of CTS rate anomaly.
detect-disconnect-sta
Enables a station disconnection attack. In
a station disconnection, attacker spoofs
the MAC address of either an active
client or an active AP. The attacker then
sends deauthenticate frames to the target
device, causing it to lose its active
association.