EasyManua.ls Logo

Siemens SCALANCE W1750D CLI - Page 166

Siemens SCALANCE W1750D CLI
762 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
CLI Commands
4.9 I
SCALANCE W1750D CLI
166 Function Manual, 03/2019, C79000-G8976-C452-04
Parameter
Description
Range
Default
no…
Removes configuration settings for parame-
ters under the ids command.
no ids
Removes IDS configuration.
Usage Guidelines
Use this command to configure IDS detection and protection policies. The IDS feature
monitors the network for the presence of unauthorized APs and clients and enables you to
detect rogue APs, interfering APs, and other devices that can potentially disrupt network
operations. It also logs information about the unauthorized APs and clients, and generates
reports based on the logged information. WIP offers a wide selection of intrusion detection
and protection features to protect the network against wireless threats. Like most other
security-related features of the network, the WIP can be configured on the AP.
You can configure the following policies:
Infrastructure Detection Policies Specifies the policy for detecting wireless attacks on
access points
Client Detection Policies Specifies the policy for detecting wireless attacks on clients
Infrastructure Protection Policies Specifies the policy for protecting access points from
wireless attacks.
Client Protection Policies Specifies the policy for protecting clients from wireless
attacks.
Containment Methods Prevents unauthorized stations from connecting to your
Scalance W network.
Each of these options contains several default levels that enable different sets of policies. An
administrator can customize enable or disable these options accordingly. The following
levels of detection can be configured:
Off
Low
Medium
High
Example
The following example configures detection and protection policies:
(scalance)(config)# ids
(scalance)(IDS)# infrastructure-detection-level low
(scalance)(IDS)# client-detection-level low
(scalance)(IDS)# infrastructure-protection-level low
(scalance)(IDS)# client-protection-level low
(scalance)(IDS)# wireless-containment deauth-only

Table of Contents

Related product manuals