Users Guide

Table Of Contents
Dell PowerConnect ArubaOS 5.0 | User Guide Access Points | 109
z ARM profile—Defines the Adaptive Radio Management (ARM) settings for scanning, acceptable coverage
levels, transmission power and noise thresholds. In most network environments, ARM does not need any
adjustments from its factory-configured settings. However, if you are using VoIP or have unusually high
security requirements you may want to manually adjust the ARM thresholds. For complete details on
Adaptive Radio Management, refer to Chapter 5, “Adaptive Radio Management (ARM)” on page139.
z High-throughput radio profile—Manages high-throughput (802.11n) radio settings for 802.11n-capable APs.
A high-throughput profile determines 40 Mhz tolerance settings, and controls whether or not the APs using
this profile will advertise intolerance of 40 MHz operation. (This option is disabled by default, allowing 40
MHz operation.)
z RF optimization profile—Enables or disables load balancing based on a user-defined number of clients or
degree of AP utilization on an AP. Use this profile to detect coverage holes, radio interference and STA
association failures and configure Received signal strength indication (RSSI) metrics.
z RF event thresholds profile—Defines error event conditions, based on a customizable percentage of low-
speed frames, non-unicast frames, or fragmented, retry or error frames.
IDS Profiles
These profiles configure the AP’s Intrusion Detection System (IDS) features, which detect and disable rogue APs
and other devices that can potentially disrupt network operations. An AP is considered to be a rogue AP if it is
both unauthorized and plugged into the wired side of the network. An AP is considered to be an interfering AP if
it is seen in the RF environment but is not connected to the wired network.
The following IDS profiles and their parameters are described in detail in “IDS Configuration” on page 466
.
z IDS General profile—Configures AP attributes.
z IDS Rate Thresholds profile—Defines thresholds assigned to the different frame types for rate anomaly
checking.
z IDS signature matching profile—Configures signatures for intrusion detection. This profile can include
predefined signatures or signatures that you configure.
z IDS DoS profile—Configures traffic anomaly settings for Denial of Service attacks.
z IDS impersonation profile—Configures anomaly settings for impersonation attacks.
z IDS unauthorized device profile—Configures detection for unauthorized devices. Also configures rogue AP
detection and containment.
z IDS profile—This profile manages a complete set of IDS profile parameters by referencing all other types of
IDS profiles
Mesh Profiles
You can provision Dell APs to operate as mesh points, mesh portals or remote mesh portals. The secure enterprise
mesh environment routes network traffic between APs over wireless hops to join multiple Ethernet LANs or to
extend wireless coverage. The Mesh profiles are:
z Mesh high-throughput SSID profile—Enables or disables high-throughput (802.11n) features and 40 Mhz
channel usage, and define values for aggregated MAC protocol data units (MDPUs) and Modulation and
Coding Scheme (MCS) ranges.
z Mesh radio profile—Determines many of the settings used by mesh nodes to establish mesh links and the
path to the mesh portal, including the maximum number of children a mesh node can accept, and transmit
rates for the 802.11a and 802.11g radios.
z Mesh cluster profile—Contains the mesh cluster name (MSSID), authentication methods, security
credentials, and cluster priority.