Reference Guide

Table Of Contents
Dell PowerConnect W-Series ArubaOS 6.1 CLI | Reference Guide ids dos-profile | 257
Usage Guidelines
DoS attacks are designed to prevent or inhibit legitimate clients from accessing the network. This includes
blocking network access completely, degrading network service, and increasing processing load on clients and
network equipment.
Example
The following command enables a detection in the DoS profile named “floor2”:
(host) (config) #ids dos-profile floor2
(host) (IDS Denial Of Service Profile "floor2") detect-ap-flood
power-save-dos-quiet-time Time to wait, in seconds, after detecting a Power
Save DoS attack after which the check can be
resumed.
60-360000
seconds
900
seconds
power-save-dos-threshold The Power Management ON packets sent by a
station as a percentage of the Power Management
OFF packets sent, in intervals of 10 second, which
will trigger this event.
60-360000
seconds
900
seconds
probe-request-rate-thresholds Rate threshold for probe request frames.
probe-response-rate-thresholds Rate threshold for probe response frames.
rts-rate-quiet-time Time to wait, in seconds, after detecting an RTS
rate anomaly after which the check can be
resumed.
60-360000
seconds
900
seconds
rts-rate-threshold Number of RTS control packets over the time
interval that constitutes an anomaly.
0-100000 5000
rts-rate-time-interval Time interval, in seconds, over which the packet
count should be checked.
1-120
seconds
5 seconds
spoofed-deauth-blacklist Enables detection of a deauth attack initiated
against a client associated to an AP. When such
an attack is detected, the client is quarantined
from the network to prevent a man-in-the-middle
attack from being successful.
true
false
false
tkip-replay-quiet-time Time to wait, in seconds, after detecting a TKIP
replay attack after which the check can be
resumed.
60-360000
seconds
900
seconds
Parameter Description Range Default