User's Manual
473 | Wireless Intrusion Prevention Dell Networking W-Series ArubaOS 6.4.x| User Guide
Feature Command Trap Syslog ID
Protecting
Against Rogue
Containment on
page 474
ids unauthorized-device-profile
rogue-containment
wlsxAPDeauthContainment
wlsxClientDeauthContainment
wlsxTarpitContainment
106005,
106006,
126102,
126103,
126108,
127102,
127103, 127108
Protecting
Against
Suspected Rogue
Containment on
page 474
ids unauthorized-device-profile
suspect-rogue-containment
suspect-rogue-conf-level
wlsxAPDeauthContainment
wlsxClientDeauthContainment
wlsxTarpitContainment
106005,
106006,
106010,
126102,
126103,
126108,
127102,
127103, 127108
Protection
against Wired
Rogue APs
ids general-profile
wired-containment
wired-containment-ap-adj-mac
wired-containment-susp-l3-rogue
wlsxAPWiredContainment 126104,126105,
126106, 126107
Protecting 40MHz 802.11 High Throughput Devices
Protection from AP(s) that support 40MHz HT involves containing the AP such that clients can not connect.
Protecting 802.11n High Throughput Devices
Protection from AP(s) that support HT involves containing the AP such that clients can not connect.
Protecting Against Adhoc Networks
Protection from an adoc Network involves containing the adhoc network so that clients can not connect to it.
The basic adhoc protection feature protects against adhoc networks using WPA/WPA2 security. The enhanced
adhoc network protection feature protects against open/WEP adhoc networks. Both features can used
together for maximum protection, or enabled or disabled separately
This feature requires that you enable the wireless-containment setting in the IDS general profile.
Protecting Against AP Impersonation
Protection from AP impersonation involves containing both the legitimate and impersonating AP so that clients
can not connect to either AP.
Protecting Against Misconfigured APs
Protect Misconfigured AP enforces that valid APs are configured properly. An offending AP is contained by
preventing clients from associating to it.
Protecting Against Wireless Hosted Networks
Clients using the Windows wireless hosted network feature can act as an access point to which other wireless
clients can connect, effectively becoming a Wi-Fi HotSpot. This creates a security issue for enterprises, because
unauthorized users can use a hosted network to gain access to the corporate network, and valid users that
connect to a hosted network are vulnerable to attack or security breaches. This feature detects a wireless
hosted network, and contains the client hosting this network.