Users Guide

Table Of Contents
496| Wireless Intrusion Prevention Dell Networking W-Series ArubaOS 6.5.x| User Guide
Feature Command Trap Syslog ID
Protecting Valid
Stations on page
496
ids unauthorized-device-profile
protect-valid-sta
wlsxAPDeauthContainment
wlsxClientDeauthContainment
wlsxTarpitContainment
106005,
106006,
126102,
126103,
126108,
127102,
127103,
127108
Protecting
Windows Bridge
on page 496
ids unauthorized-device-profile
protect-windows-bridge
wlsxAPDeauthContainment
wlsxClientDeauthContainment
wlsxTarpitContainment
106005,
106006,
126102,
126103,
126108,
127102,
127103,
127108
Table 107: Client Protection Summary
Protecting Valid Stations
Protecting a valid client involves disconnecting that client if it is associated to a non-valid AP.
Protecting Windows Bridge
Protecting from a Windows Bridge involves containing the client that is forming the bridge so that it can not
connect to the AP.
Warning Message for Containment Features
The feature for enabling wireless containment under the IDS Unauthorized Device profile and IDS
Impersonation profile may be in violation of certain Federal Communications Commission (FCC) regulatory
statutes. To address this, a warning message will be issued each time the command is enabled:
l If enabled through the WebUI, the warning message will appear before the command is executed.
l If enabled through the CLI, the warning message will appear after the command is executed
Configuring the WLAN Management System
The WLAN management system (WMS) on the controller monitors wireless traffic to detect any new AP or
wireless client station in the RFenvironment. When an AP or wireless client is detected, it is classified, and its
classification is used to determine the security policies that should be enforced on the AP or client.
In the WebUI
1. Navigate to the Configuration > Advanced Services > Wireless page.
2. Configure the parameters, as described in Table 108. Then click Apply.