Users Guide

Table Of Contents
494| Wireless Intrusion Prevention Dell Networking W-Series ArubaOS 6.5.x| User Guide
Feature Command Trap Syslog ID
Protecting
Against Wireless
Hosted Networks
ids unauthorized-device-profile detect-
wireless-hosted-network protect-wire-
less-hosted-network
wlsxWirelessHostedNetwork-
Detected
wlsxClientAssociatedToHoste
d-NetworkDetected
wlsxWirelessHostedNetwork-
Containment
wlsxHostOfWirelessNetwork-
Containment
126110,
126111,
126112, 126113
Protecting
Against Rogue
Containment on
page 495
ids unauthorized-device-profile
rogue-containment
wlsxAPDeauthContainment
wlsxClientDeauthContainment
wlsxTarpitContainment
106005,
106006,
126102,
126103,
126108,
127102,
127103,
127108
Protecting
Against
Suspected
Rogue
Containment on
page 495
ids unauthorized-device-profile
suspect-rogue-containment
suspect-rogue-conf-level
wlsxAPDeauthContainment
wlsxClientDeauthContainment
wlsxTarpitContainment
106005,
106006,
106010,
126102,
126103,
126108,
127102,
127103,
127108
Protection
against Wired
Rogue APs
ids general-profile
wired-containment
wired-containment-ap-adj-mac
wired-containment-susp-l3-rogue
wlsxAPWiredContainment 126104,126105,
126106, 126107
Protecting 40MHz 802.11 High Throughput Devices
Protection from AP(s) that support 40MHz HT involves containing the AP such that clients can not connect.
Protecting 802.11n High Throughput Devices
Protection from AP(s) that support HT involves containing the AP such that clients can not connect.
Protecting Against Adhoc Networks
Protection from an ad-hoc Network involves containing the ad-hoc network so that clients can not connect to
it. The basic ad-hoc protection feature protects against ad-hoc networks using WPA/WPA2 security. The
enhanced ad-hoc network protection feature protects against open/WEP ad-hoc networks. Both features can
be used together for maximum protection, or enabled or disabled separately
This feature requires that you enable the wireless-containment setting in the IDS general profile.
Protecting Against AP Impersonation
Protection from AP impersonation involves containing both the legitimate and impersonating AP so that clients
can not connect to either AP.