Users Guide

Table Of Contents
Configuring Tarpit Shielding
Tarpit shielding is configured on an AP using one of two methods:
l Disable all clients : In this method, any client that attempts to associate with an AP marked for
containment is sent spoofed frames.
l Disable non-valid clients : In this method, only non-authorized clients that attempt to associate with an
AP are sent to the tarpit.
The choices for disabling Tarpit Shielding on an AP are:
l Deauth-wireless-containment
l Deauth-wireless-containment with tarpit-shielding (excluding-valid-clients)
l Deauth-wireless-containment with tarpit-shielding
Enabling Tarpit Shielding
Use the ids-general-profile command to configure Tarpit Shielding (for detailed information on commands
refer to the Dell Networking W-Series ArubaOS Command Line Reference Guide).
ids general-profile default
wireless-containment [deauth-only | none | tarpit-all-sta | tarpit-non-valid-sta]
Use the following show commands to view updated Tarpit Shielding status and the spoofed frames generated
for an AP:
show ap monitor stats
show ap monitor containment-info
Understanding Tarpit Shielding LicensingCLICommands
Under the ids general-profile default wireless-containment command, the ‘tarpit-non-valid-sta and
‘tarpit-all-sta’ options are available only with a RFprotect license. The ‘deauth-only’ and ‘none’ options are
available with the Base OS license.
Dell Networking W-Series ArubaOS 6.5.x | User Guide Wireless Intrusion Prevention |
507