Users Guide

Detecting a FATA-Jack Attack Structure 549
Detecting a Hotspotter Attack 550
Detecting a Meiners Power Save DoS Attack 550
Detecting an Omerta Attack 550
Detecting Rate Anomalies 550
Detecting a TKIP Replay Attack 550
Detecting Unencrypted Valid Clients 550
Detecting a Valid Client Misassociation 550
Detecting an AirJack Attack 551
Detecting ASLEAP 551
Detecting a Null Probe Response 551
Configuring Intrusion Protection 551
Understanding Infrastructure Intrusion Protection 551
Protecting 40MHz 802.11 High Throughput Devices 553
Protecting 802.11n High Throughput Devices 553
Protecting Against Adhoc Networks 553
Protecting Against AP Impersonation 554
Protecting Against Misconfigured APs 554
Protecting Against Wireless Hosted Networks 554
Protecting SSIDs 554
Protecting Against Rogue Containment 554
Protecting Against Suspected Rogue Containment 554
Protection against Wired Rogue APs 554
Understanding Client Intrusion Protection 554
Protecting Valid Stations 555
Protecting Windows Bridge 555
Warning Message for Containment Features 555
Configuring the WLAN Management System (WMS) 555
In the WebUI 555
Dell Networking W-Series ArubaOS 6.4.x | User Guide Contents | 39