Users Guide

Table Of Contents
Dell PowerConnect ArubaOS 5.0 | User Guide Wireless Intrusion Prevention | 47 3
Configuring the Impersonation Profile via the CLI
To configure this profile via the command-line interface, access the CLI in config mode and issue the following
commands:
ids impersonation-profile <profile>
beacon-diff-threshold <percent>
beacon-inc-wait-time <seconds>
clone <profile>
detect-ap-impersonation
protect-ap-impersonation
Signature Matching Profile
The IDS signature matching profile contains signatures for intrusion detection. This profile can include
predefined signatures or signatures that you configure. Table 96 describes the predefined signatures that you can
add to the profile.
Configuring the Signature Matching Profile via the WebUI
1. Navigate to the Configuration > AP Configuration page. Select either AP Group or AP Specific.
If you selected AP Group, click Edit for the AP group name for which you want to configure IDS.
If you selected AP Specific, select the name of the AP for which you want to configure IDS.
2. Expand the IDS menu. Select IDS profile to display the IDS profiles that are contained in the top-level
profile.
3. Select IDS Signature Matching profile.
4. You can select a predefined profile from the drop-down menu. Or you can modify parameters and click Save
As to create an IDS signature-matching profile instance.
5. Click Apply.
Table 96 Predefined Signatures
Signature Description
ASLEAP A tool created for Linux systems that has been used to attack Cisco LEAP
authentication protocol.
Null-Probe-Response An attack with the potential to crash or lock up the firmware of many 802.11
NICs. In this attack, a client probe-request frame will be answered by a probe
response containing a null SSID. A number of popular NIC cards will lock up
upon receiving such a probe response.
AirJack Originally a suite of device drivers for 802.11(a/b/g) raw frame injection and
reception. It was intended to be used as a development tool for all 802.11
applications that need to access the raw protocol, however one of the tools
included allowed users to force off all users on an Access Point.
NetStumbler Generic NetStumbler is a popular wardriving application used to locate 802.11
networks. When used with certain NICs (such as Orinoco), NetStumbler
generates a characteristic frame that can be detected.
NetStumbler Version 3.3.0x Version 3.3.0 of NetStumbler changed the characteristic frame slightly. This
signature detects the updated frame.
Deauth-Broadcast A deauth broadcast attempts to disconnect all stations in range – rather than
sending a spoofed deauth to a specific MAC address, this attack sends the
frame to a broadcast address.
Note: If you selected a predefined IDS profile, you cannot select or create a different IDS signature-matching profile instance. You
can modify parameters within the IDS signature-matching profile instance.