Intrusion Detection
27.3 Configuring Wireless Intrusion Protection and Detection Levels
SCALANCE W1750D UI
444 Configuration Manual, 02/2018, C79000-G8976-C451-02
The following table describes the detection policies enabled in the Infrastructure Detection
text box:
Low
• Detect AP Spoofing
• Detect Windows Bridge
• IDS Signature — Deauthentication Broadcast
• IDS Signature — Deassociation Broadcast
Medium
• Detect ad hoc networks using VALID SSID — Valid SSID list is auto-
configured based on SCALANCE W AP configuration
• Detect Malformed Frame — Large Duration
High
• Detect AP Impersonation
• Detect ad hoc Networks
• Detect Valid SSID Misuse
• Detect Wireless Bridge
• Detect 802.11 40 MHz intolerance settings
• Detect Active 802.11n Greenfield Mode
• Detect AP Flood Attack
• Detect Client Flood Attack
• Detect Bad WEP
• Detect CTS Rate Anomaly
• Detect RTS Rate Anomaly
• Detect Invalid Address Combination
• Detect Malformed Frame — HT IE
• Detect Malformed Frame — Association Request
• Detect Malformed Frame — Auth
• Detect Overflow IE
• Detect Overflow EAPOL Key
• Detect Beacon Wrong Channel
• Detect devices with invalid MAC OUI
Infrastructure Detection Policies
The following table describes the detection policies enabled in the Client Detection
text box.
All detection policies are disabled.
Low
• Detect Valid Station Misassociation