Reference Guide

Parameter Description Range Default
bridging
rogue-containment
Controls Rogue APs. When rogue APs
are detected, they are not automatically
disabled.
This option automatically shuts down
rogue APs. When this option is enabled,
clients attempting to associate to an AP
classified as a rogue are disconnected
through a denial of service attack.
signature-airjack
Enables signature matching for the
AirJack frame type.
signature-asleap
Enables signature matching for the
ASLEAP frame type.
signature-deassociation-
broadcast
Configures signature matching for the
deassociation broadcast frame type.
signature-deauth-broadcast
Configures signature matching for the
deauth broadcast frame type.
wired-containment
Controls Wired attacks.
wireless-containment
<type>
Enable wireless containment including
Tarpit Shielding.
Tarpit shielding works by steering a
client to a tarpit so that the client
associates with it instead of the AP that is
being contained.
l deauth-only— Enables Containment
using deauthentication only .
l none Disables wireless
containment.
l tarpit-all-sta—Enables wireless
containment by tarpit of all stations.
l tarpit-non-valid-sta— Enables
wireless containment by tarpit of non-
valid clients
deauth-only,
none, tarpit-
all-sta, tarpit-
non-valid-sta
deauth-only
no
Removes any existing configuration.
Usage Guidelines
Use this command to configure Intrusion Detection System (IDS) detection and protection policies. The IDS feature
monitors the network for the presence of unauthorized W-IAPs and clients and enables you to detect rogue APs,
interfering APs, and other devices that can potentially disrupt network operations. It also logs information about the
unauthorized W-IAPs and clients, and generates reports based on the logged information.
Wireless Intrusion Protection (WIP) offers a wide selection of intrusion detection and protection features to protect
the network against wireless threats. Like most other security-related features of the Dell network, the WIP can be
configured on the W-IAP.
You can configure the following policies:
l Infrastructure Detection Policies Specifies the policy for detecting wireless attacks on access points
Dell Networking W-Series Instant 6.4.0.2-4.1 | CLI Reference Guide ids | 127