Wips – Brocade Communications Systems RFS6000 User Manual

Page 702

Advertising
background image

700

Brocade Mobility RFS4000, RFS6000 and RFS7000 CLI Reference Guide

53-1001931-01

Wireless configuration commands

20

wips

Wireless configuration commands

Configures wips parameters

Supported in the following platforms:

Mobility RFS7000 Controller

NOTE

This command is not supported on the Mobility RFS6000 Controller and Mobility RFS4000
Controller platform.

Syntax

RFController (config-wireless) wips [detect-window

<5-300>|disable|event|reset-to-default]

RFController (config-wireless) wips event

[80211-replay-check-failure|

ad-hoc-advertising-authorized-ssid|ad-hoc-network-violation-authorized-device

|ad-hoc-network-violation-unauthorized-device|

aggressive-scanning |all|ap-default-configuration|

ap-ssid-broadcast-in-beacon|

crackable-wep-iv-key-used|decryption-failures|

dos-association-or-authentication-flood |

dos-broadcast-deauthentication|dos-eapol-start-storm|

dos-unicast-deauthentication-or-disassociation|eap-flood|

eap-nak-flood|failures-reported-by-authentication-servers| fake-ap-flood

frames-from-unassociated-stations

frames-with-bad-essids|fuzzing-all-zero-mac-address-observed

|fuzzing-invalid-frame-type-detected|

fuzzing-invalid-management-frame|

fuzzing-invalid-sequence-number|

identical-source-and-destination-addresses|

impersonation-attack-detected|invalid-8021x-frames|

non-changing-wep-iv|replay-injection-attack|

suspicious-ap-high-rssi|

tkip-mic-counter-measures-caused-by-station|

transmitting-device-using-invalid-mac|

unauthorized-ap-using-authorized-ssid|

unencrypted-station-transmission-detected]{enable|

filter-out <1-86400>|threshold <1-65535>} {authorized|ignored|unauthorized}

Advertising
This manual is related to the following products: