
To revert to the standard settings from custom settings mode, click the Revert to standard settings link. You can manually enable or disable the protection mechanisms for your infrastructure. To enable custom settings, click the Allow custom settings link. Off (Default)-Disables all the protection mechanisms. Low-Enables only the most critical protection mechanisms for your infrastructure. Medium-Enables some important protection mechanisms for your infrastructure including all the options of the low level settings. High-Enables all the protection mechanisms applicable to your infrastructure including all the options of low and medium level settings. Use the slider to select one of the protection levels for the infrastructure: You can set the protection level to automatically enable the appropriate protection mechanisms or customize the settings for your infrastructure and clients. To revert to the standard settings from the custom settings mode, click the Revert to standard settings link.įigure 113 WIP Wizard’s Intrusion DetectionĪpply the intrusion protection mechanisms for your infrastructure and clients (see Figure 114). To enable custom settings, click the Allow custom settings link to manually enable or disable the detection mechanisms for your clients. Off-Disables all the detection mechanisms. Low-Enables only the most critical detection mechanisms for your infrastructure. This includes all the options of the low level settings. Medium (Default)-Enables some important detection mechanisms for your infrastructure. High-Enables all the detection mechanisms applicable to your infrastructure including all the options of low and medium level settings. Use the slider to select one of the detection levels for the infrastructure and clients: You can either set the detection level to automatically enable the appropriate detection mechanisms or customize the settings for infrastructure and client attacks. Note that the reusable wizard includes robust online Help.Īpply the intrusion detection mechanisms for detecting attacks against your infrastructure and clients (see Figure 113).


Highlighting one of the previously configured rules reveals drop down menus for changing values. Protection features for attacks against infrastructureįigure 112 displays the WIP Wizard layout.

The WebUI’s reusable, intuitive, user-friendly Wizard provides steps to enable, define, or change:ĭetection features for attacks against infrastructureĭetection features for attacks against WLAN clients This chapter contains the following sections: Rogue AP classification techniques other than AP classification rulesįor details on commands see the ArubaOS Command Line Interface Reference document. These features do not require an RFprotect license:
Mac spoofers for windows 10 install#
If you install a RFprotect license on a master controller only, an AP or AM terminated on a local controller will not provide the WIP features. To use most of the features described in this chapter, you must install a Wireless Intrusion Protection (RFprotect) license on all controllers in your network.

Like most other security-related features of the Aruba network, the WIP configuration is done on the master controller in the network. WIP offers a wide selection of intrusion detection and protection features to protect the network against wireless threats. The ArubaOS Wireless Intrusion Prevention (WIP) features and configurations are discussed in this chapter.
