Concept Guide

Table Of Contents
146 | ids Dell Networking W-Series Instant 6.4.3.1-4.2.0.0 | CLI Reference Guide
Syntax
Parameter Description Range Default
ids
Creates an IDS policy
client-detection-level
<type>
Sets the client detection level. off, low,
medium, high
off
client-protection-level
<type>
Sets the client protection level. off, low,
medium, high
off
detect-adhoc-network
Enables detection of adhoc networks.
detect-ap-flood
Enables detection of flooding with fake
W-IAP beacons to confuse the legitimate
users and to increase the amount of
processing needed on client operating
systems.
detect-ap-impersonation
Enables detection of AP impersonation.
In AP impersonation attacks, the
attacker sets up an AP that assumes the
BSSID and ESSID of a valid AP. AP
impersonation attacks can be done for
man-in-the-middle attacks, a rogue AP
attempting to bypass detection, or a
honeypot attack.
detect-ap-spoofing
Enables AP Spoofing detection.
detect-bad-wep
Enables detection of WEP initialization
vectors that are known to be weak
and/or repeating. A primary means of
cracking WEP keys is to capture 802.11
frames over an extended period of time
and search for implementations that
are still used by many legacy devices.
detect-beacon-wrong-
channel
Enables detection of beacons
advertising the incorrect channel.
detect-block-ack-attack
Enables detection of attempts to reset
traffic receive windows using the forged
Block ACK Add messages.
detect-chopchop-attack
Enables detection of ChopChop attack.
detect-client-flood
Enables detection of client flood attack.
detect-cts-rate-anomaly
Enables detection of CTS rate anomaly.