Users Guide

Table Of Contents
Dell PowerConnect ArubaOS 5.0 | User Guide | 21
Remote Branch 2....................................................................................................................458
W-3200 Central Office Controller—Active.........................................................................459
W-3200 Central Office Controller—Backup.......................................................................461
Chapter 24 Wireless Intrusion Prevention.......................................................................................463
IDS Features....................................................................................................................................463
Unauthorized Device Detection...........................................................................................463
Rogue/Interfering AP Detection ..................................................................................463
Adhoc Network Detection and Containment.............................................................464
Wireless Bridge Detection ...........................................................................................464
Misconfigured AP Detection........................................................................................464
Weak WEP Detection....................................................................................................464
Multi Tenancy Protection .............................................................................................464
MAC OUI Checking ........................................................................................................464
Denial of Service (DoS) Detection.......................................................................................464
Rate Analysis ..................................................................................................................465
Fake AP............................................................................................................................465
Impersonation Detection ......................................................................................................465
Station Disconnection...................................................................................................465
EAP Handshake Analysis..............................................................................................465
Sequence Number Analysis.........................................................................................465
AP Impersonation...........................................................................................................465
Signature Detection...............................................................................................................466
IDS Configuration ...........................................................................................................................466
IDS Profile Hierarchy.............................................................................................................466
Configuring IDS via the WebUI ....................................................................................466
Configuring IDS via the CLI...........................................................................................467
IDS General Profile.................................................................................................................467
Configuring the General Profile via the WebUI.........................................................468
Configuring the General Profile via the CLI................................................................468
Denial of Service Attack Detection.....................................................................................468
Configuring the DoS profile via the WebUI................................................................470
Configuring the DoS profile via the CLI.......................................................................470
IDS Rate Thresholds Profile .................................................................................................471
Configuring the Rate Threshold Profile via the WebUI............................................471
Configuring the Rate Thresholds Profile via the CLI.................................................472
Impersonation Detection Profile..........................................................................................472
Configuring the Impersonation Profile via the WebUI.............................................472
Configuring the Impersonation Profile via the CLI....................................................473
Signature Matching Profile ..................................................................................................473
Configuring the Signature Matching Profile via the WebUI ...................................473
Configuring the Signature Matching Profile via the CLI..........................................474
IDS Signature Profile .............................................................................................................474
Creating a New Signature via the WebUI..................................................................474
Creating a New Signature via the CLI.........................................................................475
Unauthorized Device Detection...........................................................................................475
Configuring the Unauthorized Device Profile via the WebUI..................................479
Configuring the Unauthorized Device Profile via the CLI ........................................479
WLAN Management System........................................................................................................480
Configuring WMS via the WebUI ........................................................................................480
Configuring WMS via the CLI ...............................................................................................481
Configuring Local WMS Settings ................................................................................481
Managing the WMS Database ....................................................................................481
Enabling AP Learning.............................................................................................................481
Classifying APs .......................................................................................................................482
Configuring Misconfigured AP Detection and Protection...............................................482
Valid Enterprise SSIDs...........................................................................................................483