CLI Commands
4.9 I
SCALANCE W1750D CLI
166
Function Manual, 03/2019, C79000-G8976-C452-04
Parameter
Description
Range
Default
no…
Removes configuration settings for parame-
ters under the ids command.
—
—
no ids
Removes IDS configuration.
—
—
Usage Guidelines
Use this command to configure IDS detection and protection policies. The IDS feature
monitors the network for the presence of unauthorized APs and clients and enables you to
detect rogue APs, interfering APs, and other devices that can potentially disrupt network
operations. It also logs information about the unauthorized APs and clients, and generates
reports based on the logged information. WIP offers a wide selection of intrusion detection
and protection features to protect the network against wireless threats. Like most other
security-related features of the network, the WIP can be configured on the AP.
You can configure the following policies:
●
Infrastructure Detection Policies — Specifies the policy for detecting wireless attacks on
access points
●
Client Detection Policies — Specifies the policy for detecting wireless attacks on clients
●
Infrastructure Protection Policies — Specifies the policy for protecting access points from
wireless attacks.
●
Client Protection Policies — Specifies the policy for protecting clients from wireless
attacks.
●
Containment Methods — Prevents unauthorized stations from connecting to your
Scalance W network.
Each of these options contains several default levels that enable different sets of policies. An
administrator can customize enable or disable these options accordingly. The following
levels of detection can be configured:
●
Off
●
Low
●
Medium
●
High
Example
The following example configures detection and protection policies:
(scalance)(config)# ids
(scalance)(IDS)# infrastructure-detection-level low
(scalance)(IDS)# client-detection-level low
(scalance)(IDS)# infrastructure-protection-level low
(scalance)(IDS)# client-protection-level low
(scalance)(IDS)# wireless-containment deauth-only