Specifications

xxix
Configuring an Ignore List .....................................................................................................................22-10
Examples........................................................................................................................................22-10
Enabling Countermeasures .........................................................................................................................22-11
Examples ..............................................................................................................................................22-11
Disabling or Reenabling Active Scan ..........................................................................................................22-11
Example ................................................................................................................................................22-11
Enabling AP Signatures...............................................................................................................................22-12
Disabling or Reenabling Logging of Rogues ...............................................................................................22-12
Enabling Rogue and Countermeasures Notifications..................................................................................22-12
IDS and DoS Alerts .....................................................................................................................................22-12
Flood Attacks ........................................................................................................................................22-13
DoS Attacks ..........................................................................................................................................22-13
Netstumbler and Wellenreiter Applications ...........................................................................................22-14
Wireless Bridge .....................................................................................................................................22-14
Ad-Hoc Network .................................................................................................................................... 22-14
Weak WEP Key Used by Client ............................................................................................................22-14
Disallowed Devices or SSIDs................................................................................................................ 22-15
Displaying Statistics Counters...............................................................................................................22-15
IDS Log Message Examples.................................................................................................................22-15
Displaying RF Detection Information ...........................................................................................................22-17
Displaying Rogue Clients ......................................................................................................................22-18
Examples........................................................................................................................................22-18
Displaying Rogue Detection Counters ..................................................................................................22-19
Example..........................................................................................................................................22-19
Displaying SSID or BSSID Information for a Mobility Domain ..............................................................22-20
Examples........................................................................................................................................22-20
Displaying RF Detect Data....................................................................................................................22-21
Example..........................................................................................................................................22-21
Displaying the APs Detected by an AP Radio.......................................................................................22-22
Displaying Countermeasures Information .............................................................................................22-22
Example..........................................................................................................................................22-22
Chapter 23: Managing System Files
About System Files........................................................................................................................................23-1
Displaying Software Version Information ................................................................................................23-2
Example............................................................................................................................................ 23-2
Displaying Boot Information ....................................................................................................................23-3
Example............................................................................................................................................ 23-3
Working with Files .........................................................................................................................................23-4
Displaying a List of Files .........................................................................................................................23-4
Examples..........................................................................................................................................23-4
Copying a File .........................................................................................................................................23-5
Examples..........................................................................................................................................23-6
Using an Image File’s MD5 Checksum To Verify Its Integrity .................................................................23-7
Deleting a File .........................................................................................................................................23-8
Examples..........................................................................................................................................23-8
Creating a Subdirectory ..........................................................................................................................23-8
Example............................................................................................................................................ 23-8
Removing a Subdirectory........................................................................................................................23-9
Example............................................................................................................................................ 23-9
Managing Configuration Files........................................................................................................................23-9
Displaying the Running Configuration.....................................................................................................23-9
Examples........................................................................................................................................23-10