Avaya WLAN 8100 Series Reference page 102

Cli reference
Hide thumbs Also See for WLAN 8100 Series:
Table of Contents

Advertisement

ACLI reference for Wireless LAN (WLAN) 8100
ageout
known-ap
rogue-ap
rogue-client
WCP8180(config-security)#wips ?
Configure Wireless Intrusion Protection
mitigation
Use the following commands to configure WIDS — WIPS.
Before you begin
To execute the following commands, you must be in one of the following CLI configuration
modes.
• Wireless security configuration mode:
Execute the following commands:
WC8180#conf t
WC8180(config)wireless#
WC8180#(config-wireless)#security
WC8180#(config-security)#
• Wireless radio profile configuration mode:
Execute the following commands:
WC8180#conf t
WC8180(config)wireless#
WC8180#(config-wireless)#radio-profile <radio-profile number>
For example:
WC8180(config-wireless)#radio-profile 1
Entering radio-profile (id = 1) configuration mode...
WC8180(config-radio-profile)#
Procedure
1. Enable detection of Rogue AP threats.
102
Avaya WLAN 8100 CLI Reference
Configure WIDS ageout timers
Create/Modify an AP known to WIDS.
Change rogue AP parameters
Change rogue client parameters
Configure Threat Mitigation
Use one of the following command options to enable detection of specific Rogue
AP threats.
WCP8180(config-security)#wids rogue-ap threat ?
fake-ap-on-invalid-channel
illegal-channel
invalid-ssid-from-managed-ap
known-standalone-ap-cfgerr
managed-ssid-rcvd-from-fake-ap
managed-ssid-rcvd-from-unknown-ap
managed-ssid-with-invalid-security AP using invalid security on managed
SSID
no-ssid-rcvd-from-ap
unexpected-wids-device
unmanaged-ap-on-wired-net
Comments? infodev@avaya.com
Fake AP operating on illegal channel
AP operating on illegal channel
Managed AP using invalid SSID
Standalone AP with unexpected
configuration
Fake AP detected with managed SSID
Unknown AP using managed SSID
AP with no SSID
Unexpected WDS device
Unmanaged AP detected on wired network
August 2013

Advertisement

Table of Contents
loading

Table of Contents