Reference Guide

0511587-03 | September 2014 Dell Networking W-Series Instant 6.4.2.0-4.1.1 | CLI Reference Guide
Usage Guidelines
Use this command to configure Intrusion Detection System (IDS) detection and protection policies. The IDS
feature monitors the network for the presence of unauthorized W-IAPs and clients and enables you to detect
rogue APs, interfering APs, and other devices that can potentially disrupt network operations. It also logs
information about the unauthorized W-IAPs and clients, and generates reports based on the logged
information.
Wireless Intrusion Protection (WIP) offers a wide selection of intrusion detection and protection features to
protect the network against wireless threats. Like most other security-related features of the Dell network, the
WIP can be configured on the W-IAP.
You can configure the following policies:
l Infrastructure Detection Policies— Specifies the policy for detecting wireless attacks on access points
l Client Detection Policies Specifies the policy for detecting wireless attacks on clients
l Infrastructure Protection Policies— Specifies the policy for protecting access points from wireless attacks.
l Client Protection Policies— Specifies the policy for protecting clients from wireless attacks.
l Containment Methods Prevents unauthorized stations from connecting to your Instant network.
Each of these options contains several default levels that enable different sets of policies. An administrator can
customize enable or disable these options accordingly. The following levels of detection can be configured:
l Off
l Low
l Medium
l High
Example
The following example configures detection and protection policies:
(Instant AP)(config)# ids
(Instant AP)(IDS)# infrastructure-detection-level low
(Instant AP)(IDS)# client-detection-level low
(Instant AP)(IDS)# infrastructure-protection-level low
(Instant AP)(IDS)# client-protection-level low
(Instant AP)(IDS)# wireless-containment deauth-only
(Instant AP)(IDS)# wired-containment
(Instant AP)(IDS)# detect-ap-spoofing
(Instant AP)(IDS)# detect-windows-bridge
(Instant AP)(IDS)# signature-deauth-broadcast
(Instant AP)(IDS)# signature-deassociation-broadcast
(Instant AP)(IDS)# detect-adhoc-using-valid-ssid
(Instant AP)(IDS)# detect-malformed-large-duration
(Instant AP)(IDS)# detect-ap-impersonation
(Instant AP)(IDS)# detect-adhoc-network
(Instant AP)(IDS)# detect-valid-ssid-misuse
(Instant AP)(IDS)# detect-wireless-bridge
(Instant AP)(IDS)# detect-ht-40mhz-intolerance
(Instant AP)(IDS)# detect-ht-greenfield
(Instant AP)(IDS)# detect-ap-flood
(Instant AP)(IDS)# detect-client-flood
(Instant AP)(IDS)# detect-bad-wep
(Instant AP)(IDS)# detect-cts-rate-anomaly
(Instant AP)(IDS)# detect-rts-rate-anomaly
(Instant AP)(IDS)# detect-invalid-addresscombination
(Instant AP)(IDS)# detect-malformed-htie
(Instant AP)(IDS)# detect-malformed-assoc-req
(Instant AP)(IDS)# detect-malformed-frame-auth