User's Manual

Feature Command Trap
Syslog
ID
Detecting an
802.11n 40MHz
Intolerance
Setting on page
463
ids dos-profile
detect-ht-40mhz-intolerance
client-ht-40mhz-intol-quiet-time
wlsxHT40MHzIntoleranceAP
wlsxHT40MHzIntoleranceSta
12605
2,
12605
3,
12705
2,
127053
Detecting Active
802.11n
Greenfield
Mode on page
464
ids unauthorized-device-profile
detect-ht-greenfield
wlsxHtGreenfieldSupported 12605
4,
127054
Detecting Ad
hoc Networks
on page 464
ids unauthorized-device-profile
detect-adhoc-network
wlsxNAdhocNetwork 12603
3,
127033
Detecting an Ad
hoc Network
Using a Valid
SSID on page
464
ids unauthorized-device-profile
detect-adhoc-using-valid-ssid
adhoc-using-valid-ssid-quiet-time
wlsxAdhocUsingValidSSID 12606
8,
127068
Detecting an AP
Flood Attack on
page 464
ids dos-profile
detect-ap-flood
ap-flood-threshold
ap-flood-inc-time
ap-flood-quiet-time
wlsxApFloodAttack 12603
4,
127034
Detecting AP
Impersonation
on page 464
ids impersonation-profile
detect-ap-impersonation
beacon-diff-threshold
beacon-inc-wait-time
wlsxAPImpersonation 12600
6,
127006
Detecting AP
Spoofing on
page 464
ids impersonation-profile
detect-ap-spoofing
ap-spoofing-quiet-time
wlsxAPSpoofingDetected
wlsxClientAssociatingOn
WrongChannel
12606
9,
12607
0,
12706
9,
127070
Table 86: Infrastructure Detection Summary
Dell Networking W-Series ArubaOS 6.4.x | User Guide Wireless Intrusion Prevention | 460