Users Guide

Table Of Contents
Feature Command Trap Syslog ID
Protecting
40MHz 802.11
High
Throughput
Devices on
page 553
ids unauthorized-device-profile
protect-ht-40mhz
wlsxAPDeauthContainment
wlsxClientDeauthContainment
wlsxTarpitContainment
106005,
106006,
126102,
126103,
126108,
127102,
127103,
127108
Protecting
802.11n High
Throughput
Devices on
page 553
ids unauthorized-device-profile
protect-high-throughput
wlsxAPDeauthContainment
wlsxClientDeauthContainment
wlsxTarpitContainment
106005,
106006,
126102,
126103,
126108,
127102,
127103,
127108
Protecting
Against Adhoc
Networks on
page 553
ids unauthorized-device-profile
protect-adhoc-network
protect-adhoc-enhanced
wlsxAPDeauthContainment
wlsxClientDeauthContainment
wlsxTarpitContainment
wlsxEhancedAdhocContainme
nt
106005,
106006,
126012,
126102,
126103,
126108,
127102,
127103,
127108,
126114
Protecting
Against AP
Impersonation
on page 554
ids impersonation-profile
protect-ap-impersonation
wlsxAPDeauthContainment
wlsxClientDeauthContainment
wlsxTarpitContainment
106005,
106006,
126102,
126103,
126108,
127102,
127103,
127108
Protecting
Against
Misconfigured
APs on page
554
ids unauthorized-device-profile
protect-misconfigured-ap
wlsxAPDeauthContainment
wlsxClientDeauthContainment
wlsxTarpitContainment
106005,
106006,
126102,
126103,
126108,
127102,
127103,
127108
Table 109: Infrastructure Protection Summary
Dell Networking W-Series ArubaOS 6.4.x | User Guide Wireless Intrusion Prevention |
552