DWS-3160 Series Gigabit Ethernet Unified Switch CLI Reference Guide
919
Example
To configure the rogue detection trap interval:
DWS-3160-24PC:admin#config wireless wids_security client
rogue_det_trap_interval 3600
Command: config wireless wids_security client rogue_det_trap_interval 3600
Success.
DWS-3160-24PC:admin#
96-13
config wireless wids_security client threat_mitigation
Description
This command is used to enable or disable the transmission of de-authentication messages to
known clients associated with unknown APs. The “Known Client” test must also be enabled in
order for the mitigation to take place.
Format
config wireless wids_security client threat_mitigation [enable | disable]
Parameters
enable
- Specifies to enable the transmission of de-authentication messages to known clients
associated with unknown APs.
disable
- Specifies to disable the transmission of de-authentication messages to known clients
associated with unknown APs. This is the default option.
Restrictions
Only Administrators can issue this command.
Example
To enable the transmission of de-authentication messages to known clients associated with
unknown APs:
DWS-3160-24PC:admin#config wireless wids_security client threat_mitigation
enable
Command: config wireless wids_security client threat_mitigation enable
Success.
DWS-3160-24PC:admin#
96-14
config wireless wids_security client threshold_auth_failure
Description
This command is used to specify the number of 802.1x authentication failures that triggers the
client to be reported as rogue.