Concept Guide

Table Of Contents
--- -- ------ ---
d8:c7:c8:cb:d4:20 10.17.88.188 0 1s
d8:c7:c8:cb:d3:d4 10.17.88.186 0 1s
00:0b:86:40:1c:a0 10.17.88.129 0 1m:18s
show ap monitor containment-info
The following example shows the output of show ap monitor containment-info command:
br0:10.17.88.188
ARP Cache Table
---------------
mac ip vlanid age
--- -- ------ ---
d8:c7:c8:cb:d4:20 10.17.88.188 0 1s
d8:c7:c8:cb:d3:d4 10.17.88.186 0 1s
00:0b:86:40:1c:a0 10.17.88.129 0 1m:18s
show ap monitor enet-wired-mac
The following example shows the output of show ap monitor enet-wired-mac command:
Wired MAC Table
---------------
mac age
show ap monitor ids-state
Use this command to view information about the Intrusion Detection System (IDS) the following detection
polices:
l Detect Block ACK DOS
l Disconnect station attack
l Intrusion event Type
l Intrusion rate parameters
l Detect Omerta attack
l Detect Power Save DOS Attack
l Detect Rate Anomaly
l Sequence
l IDS Signature— Deauthentication Broadcast and Deassociation Broadcast
l Detect AP Spoofing
l Valid and Protected SSIDs (from IDS Unauthorized Device Profile)
The following example shows the output of show ap monitor ids-state valid-ssid command.
System Generated (using WLAN SSID profile configuration)
---------------------------------------------------------
SSID
----
Valid and Protected SSIDs (from IDS Unauthorized Device Profile)
------------------------------------------------------------------
SSID
----
example1
example-local-nw
a36534e02ee1f3a7edeb0c247d07c9b
show ap monitor pot-ap-list
The following example shows the output of show ap monitor pot-ap-list command.
Dell Networking W-Series Instant 6.4.3.1-4.2.0.0 | CLI Reference Guide show ap monitor | 335