Users Guide

Table Of Contents
Table 104 presents a summary of the Intrusion infrastructure detection features with their related commands,
traps, and syslog identification. Feature details follow the table.
Feature Command Trap
Syslog
ID
Detecting an
802.11n
40MHz
Intolerance
Setting on
page 484
ids dos-profile
detect-ht-40mhz-intolerance
client-ht-40mhz-intol-quiet-time
wlsxHT40MHzIntoleranceAP
wlsxHT40MHzIntoleranceSta
1260
52,
1260
53,
1270
52,
1270
53
Detecting
Active 802.11n
Greenfield
Mode on page
485
ids unauthorized-device-profile
detect-ht-greenfield
wlsxHtGreenfieldSupported 1260
54,
1270
54
Detecting Ad
hoc Networks
on page 485
ids unauthorized-device-profile
detect-adhoc-network
wlsxNAdhocNetwork 1260
33,
1270
33
Detecting an
Ad hoc
Network Using
a Valid SSID on
page 485
ids unauthorized-device-profile
detect-adhoc-using-valid-ssid
adhoc-using-valid-ssid-quiet-time
wlsxAdhocUsingValidSSID 1260
68,
1270
68
Detecting an
AP Flood
Attack on page
485
ids dos-profile
detect-ap-flood
ap-flood-threshold
ap-flood-inc-time
ap-flood-quiet-time
wlsxApFloodAttack 1260
34,
1270
34
Detecting AP
Impersonation
on page 485
ids impersonation-profile
detect-ap-impersonation
beacon-diff-threshold
beacon-inc-wait-time
wlsxAPImpersonation 1260
06,
1270
06
Detecting AP
Spoofing on
page 485
ids impersonation-profile
detect-ap-spoofing
ap-spoofing-quiet-time
wlsxAPSpoofingDetected
wlsxClientAssociatingOn
WrongChannel
1260
69,
1260
70,
1270
69,
1270
70
Table 104: Infrastructure Detection Summary
Dell Networking W-Series ArubaOS 6.5.x | User Guide Wireless Intrusion Prevention |
481