Concept Guide

Table Of Contents
ids
ids
client-detection-level <type>
client-protection-level <type>
detect-adhoc-network
detect-ap-flood
detect-ap-impersonation
detect-ap-spoofing
detect-bad-wep
detect-beacon-wrong-channel
detect-block-ack-attack
detect-chopchop-attack
detect-client-flood
detect-cts-rate-anomaly
detect-disconnect-sta
detect-eap-rate-anomaly
detect-fatajack
detect-hotspotter-attack
detect-ht-40mhz-intolerance
detect-ht-greenfield
detect-invalid-addresscombination
detect-invalid-mac-oui
detect-malformed-assoc-req
detect-malformed-frame-auth
detect-malformed-htie
detect-malformed-large-duration
detect-omerta-attack
detect-overflow-eapol-key
detect-overflow-ie
detect-power-save-dos-attack
detect-rate-anomalies
detect-rts-rate-anomaly
detect-tkip-replay-attack
detect-unencrypted-valid
detect-valid-clientmisassociation
detect-valid-ssid-misuse
detect-windows-bridge
detect-wireless-bridge
infrastructure-detection-level <type>
infrastructure-protection-level <type>
protect-adhoc-network
protect-ap-impersonation
protect-ssid
protect-valid-sta
protect-windows-bridge
rogue-containment
signature-airjack
signature-asleap
signature-deassociation-broadcast
signature-deauth-broadcast
wired-containment
wireless-containment <type>
no
no ids
Description
This command configures an IDS policy for a W-IAP.
Dell Networking W-Series Instant 6.4.3.1-4.2.0.0 | CLI Reference Guide ids | 145