WESM zl Management and Configuration Guide WT.01.28 and greater
12-60
Wireless Network Management
Configuring Station Intrusion Detection
4. Set the Radio threshold value for each violation type. If met, the violation will
be logged.
Enter a number from 0 through 65,535.
Note: Setting a violation parameter to 0 will disable the option.
5. Similarly, set the Wireless Module threshold value for each violation type. If
met, the violation will be logged.
Enter a number from 0 through 65,535.
Note: Setting a violation parameter to 0 will disable the option.
Note Violation types include:
• Excessive Probes
• Excessive Association
• Excessive Disassociation
• Excessive Authentication failure
• Excessive Crypto replays
• Excessive 802.11 replays
• Excessive Decryption failures
• Excessive Unassociated Frames
• Excessive EAP Start Frames
6. In the Time to Filter field, enter a time from 0 through 86,400 seconds to control
how long the module will filter, or block, traffic from a station that exceeds a
threshold. The default time is 60 seconds.
7. Click the Apply button.
Configuring the Module to Report Station Intrusion
You can also configure the module to send an alarm when it detects station intrusion.
To configure this SNMP trap, complete these steps:
1. Select Management > SNMP Trap Configuration > Configuration.
2. Expand the Wireless heading and then the Intrusion Detection heading.