IDS DOS-PROFILE
IDS DOS-PROFILE
ap-flood-incime
ap-flood Quiet时间
ap-flood-threshold
联合利率阈值
auth-rate-thresholds
block-ack-dos-quiet-time
Chopchop-Quiet时间
client-ht-40mhz-intol-quiet-time
client-flood-inc-time
客户 - 豪华Quiet时间
客户 - 洪水阈值<客户 - 洪水阈值>
clone
cts-rate-quiet-time
cts-rate-threshold
cts-rate-time-interval
deauth-rate-thresholds
detect-ap-flood
检测障碍物
detect-chopchop-attack
detect-client-flood
detect-cts-rate-anomaly
detect-disconnect-sta
detect-eap-rate-anomaly
detect-fata-jack-attack
detect-ghosttunnel-client-attack
检测GhostTunnel-Server-攻击
检测HT-40MHz-Intererance
检测活气化地址
detect-malformed-association-request
detect-malformed-auth-frame
detect-malformed-htie
detect-malformed-large-duration
detect-omerta-attack
检测流动键
检测流出
检测功率弹药攻击
检测率 - 异常
detect-rts-rate-anomaly
detect-tkip-replay-attack
detect-wpa-ft-attack
disassoc-rate-thresholds
断开连接deauth-disassoc-threshold <断开连接 - deauth-disassoc-threshold>
脱节 - sta-assoc-resp-threshold
disconnect-sta-quiet-time
EAP-rate-Quiet时间
EAP率 - 阈值
eap-rate-time-interval
fata-jack-quiet-time
ghosttunnel-cantact-interval
ghosttunnel-client-attack-threshold
ghosttunnel-client-quiet time
ghosttunnel-server-attack-interval
GhostTunnel-Server-Attack-Threshold
ghosttunnel-server-quiet-time
无效的地址 - 分组Quiet时间<无效的 - 地址 - 构想 - Quiet-Quiet-time>
畸形 - 协会 - 要求 -安静的时光
畸形的frame-quiet时间<畸形的作者Quiet-Quiet-time>
畸形的htie-quiet时间<畸形htie-quiet time>
畸形的大型武器Quiet-Quiet <畸形的大型持续时间Quiet-Quiet-time>
no
Omerta-Quiet时间
omerta-threshold
溢出量表Quiet-Quiet-Quiet
溢出的时间
电力 - 驱动式速率框架
电力驱动器时间
电力驱动阈值
probe-request-rate-thresholds
探针响应利率阈值<探针 - 响应率 - 阈值>
RTS-rate-Quiet-Quiet
rts-rate-threshold
RTS利率时间间隔
tkip-Replay-Quiet
wpa-ft-Quiet时间
wpa-ft-threshold
wpa-ft时间间隔
Description
This command configures traffic anomalies for DoS attacks. DoS attacks are designed to prevent or inhibit legitimate clients from accessing the network. This includes blocking network access completely, degrading network service, and increasing processing load on clients and network equipment.
范围 |
Description |
Name of the IDS DoS profile. 1-63 characters “default” |
|
ap-flood-incime |
时间,在几秒钟内,在此期间,AP计数超过了阈值(AP洪水)。 0-36000秒 3600 seconds |
ap-flood-quiet-time |
After an alarm has been triggered by an AP flood, the time, in seconds, that must elapse before an identical alarm may be triggered. 60-360000秒 900秒 |
ap-flood-threshold |
Threshold for the number of spurious APs in the system. 0-100,000 50 |
阈值 <联合利率 - 阈值> |
关联请求帧的费率阈值。 |
auth-rate-thresholds |
身份验证帧的速率阈值。 |
block-ack-dos-quiet-time |
Time to wait, in seconds, after detecting an attempt to reset the receive window using a forged block ACK add. 60-360000秒 900秒 |
chopchop-quiet-time |
Time to wait, in seconds, after detecting a ChopChop attack after which the check can be resumed. 60-360000秒 900秒 |
client-ht-40mhz-intol-quiet- |
Quiet time (when to stop reporting intolerant STAs if they have not been detected), in seconds, for detection of 802.11n 40 MHz intolerance setting. 60-360000秒 900秒 |
client-flood-inc-time |
Number of consecutive seconds over which the client count is more than the threshold. 0-36000秒 3秒 |
客户 - 豪华Quiet时间 |
Time to wait, in seconds, after detecting a client flood before continuing the check. 60-360000秒 900秒 |
client-flood-threshold |
Threshold for the number of spurious clients in the system. 0-100000 150 |
clone |
从另一个ID复制数据S Denial Of Service Profile. |
cts-rate-quiet-time |
Time to wait, in seconds, after detecting a CTS rate anomaly after which the check can be resumed. 60-360000秒 900秒 |
cts-rate-threshold |
Number of CTS control packets over the time interval that constitutes an anomaly. 0-100000 5000 |
cts-rate-time-interval |
Time interval, in seconds, over which the packet count should be checked. 1-120秒 5秒 |
deauth-rate-thresholds |
率阈值的阈值。 |
detect-ap-flood |
启用或禁用AP洪水攻击的检测。 禁用 |
检测障碍物 |
启用或禁用检测尝试使用Forged Block ACK添加消息重置流量接收窗口的尝试。 enabled |
detect-chopchop-attack |
启用或禁用Chopchop攻击的检测。 禁用 |
detect-client-flood |
Enables or disables detection of client flood attacks. 禁用 |
detect-cts-rate-anomaly |
Enables or disables detection of CTS rate anomalies. 禁用 |
detect-disconnect-sta |
在电台断开攻击中,攻击者欺骗了活动客户端或活动AP的MAC地址。然后,攻击者将非限化帧发送到目标设备,从而失去其主动关联。 Use this command to enable the detection of disconnect station attack. enabled |
detect-eap-rate-anomaly |
Enables or disables detection of the EAP handshake rate anomaly. 禁用 |
detect-fata-jack-attack |
Enables or disables detection of FATA-Jack attacks. enabled |
detect-ghosttunnel-client-attack |
启用或禁用幽灵隧道客户端攻击的检测。 禁用 |
检测GhostTunnel-Server-攻击 |
启用或禁用幽灵隧道服务器攻击的检测。 禁用 |
检测HT-40MHz-Intererance |
Enables or disables detection of 802.11n 40 MHz intolerance setting, which controls whether stations and APs advertising 40 MHz intolerance will be reported. 禁用 |
检测活气化地址 |
Enables or disables detection of invalid address combinations. 禁用 |
detect-malformed-association- |
启用或禁用检测错误的关联请求。 禁用 |
detect-malformed-auth-frame |
启用或禁用检测错误的身份验证框架。 禁用 |
detect-malformed-htie |
Enables or disables detection of malformed HT IE. 禁用 |
detect-malformed-large-duration |
Enables or disables detection of unusually large durations in frames. enabled |
detect-omerta-attack |
启用或禁用OMERTA攻击的检测。 enabled |
检测流动键 |
Enables or disables detection of overflow EAPOL key requests. 禁用 |
检测流出 |
启用或禁用溢出IE的检测。 禁用 |
检测功率弹药攻击 |
启用或禁用电源的检测节省DOS攻击。 enabled |
检测率 - 异常 |
启用或禁用速率异常检测。 禁用 |
detect-rts-rate-anomaly |
启用或禁用RTS速率异常的检测。 禁用 |
detect-tkip-replay-attack |
Enables or disables detection of TKIP replay attacks. 禁用 |
detect-wpa-ft-attack |
Enables or disables detection of WPA FT attacks. 禁用 |
disassoc-rate-thresholds |
Rate threshold for disassociate frames. |
disconnect-deauth-disassoc- |
Number of deauthentication or disassociation frames seen in an interval of 10 seconds. 1-50 8 |
断开sta-assoc-resp- |
The number of successful Association Response or Reassociation response frames seen in an interval of 10 seconds. 1-30 5 |
disconnect-sta-quiet-time |
在检测到电台断开攻击后,在恢复检查之前必须在几秒钟内进行的时间。 60-360000秒 900秒 |
eap-rate-quiet-time |
After an EAP rate anomaly alarm has been triggered, the time, in seconds, that must elapse before the check can be resumed. 60-360000秒 900秒 |
EAP率阈值 |
必须在EAP速率时间间隔内接收的EAP握手数量才能触发警报。 0-100000 60 |
eap-rate-time-interval |
Time, in seconds, during which the configured number of EAP handshakes must be received to trigger an alarm. 1-120秒 3秒 |
fata-jack-quiet-time |
在发现FATA杰克攻击之后,可以在几秒钟内等待,然后可以恢复检查。 60-360000秒 900秒 |
ghosttunnel-cantact-interval |
Time interval, in seconds, over which the packet count is checked. Default is 60 seconds. Maximum is 600 seconds. |
ghosttunnel-client-attack-threshold |
在构成幽灵隧道攻击的时间间隔内,伪造AP的探测请求管理数据包数量。默认值为10。最大值为100000。 |
ghosttunnel-client-Quiet时间 |
在发现幽灵隧道攻击之后,该恢复了检查后等待几秒钟的时间。默认值为900秒。至少为60秒。 |
ghosttunnel-server-attack-interval |
Time interval, in seconds, over which the packet count is checked. Default is 60 seconds. Maximum is 600 seconds. |
GhostTunnel-Server-Satpack-Threshold |
Number of beacon management packets for a fake AP over the time interval that constitutes a ghost tunnel attack. Default is 200. Maximum is 10000. |
ghosttunnel-server-quiet-time |
在发现幽灵隧道攻击之后,该恢复了检查后等待几秒钟的时间。默认值为900秒。至少为60秒。 |
invalid-address-combination- |
时间等,以秒为单位,在检测invalid address combination after which the check can be resumed. 60-360000秒 900秒 |
畸形 - 协会 - 要求 - |
Time to wait, in seconds, after detecting a malformed association request after which the check can be resumed. 60-360000秒 900秒 |
畸形的作者Quiet时间 <畸形的作者 - Quiet-Quiet-time> |
Time to wait, in seconds, after detecting a malformed authentication frame after which the check can be resumed. 60-360000秒 900秒 |
malformed-htie-quiet-time |
Time to wait, in seconds, after detecting a malformed HT IE after which the check can be resumed. 60-360000秒 900秒 |
malformed-large-duration-quiet-time |
Time to wait, in seconds, after detecting a large duration for a frame after which the check can be resumed. 60-360000秒 900秒 |
no |
Negates any configured parameter. |
omerta-quiet-time |
在发现omerta攻击之后,可以在几秒钟内等待,然后可以恢复检查。 60-360000秒 900秒 |
omerta-threshold |
The Disassociation packets received by a station as a percentage of the number of data packets sent, in an interval of 10 seconds. 1-100 10% |
溢出量的Quiet时间 |
Time to wait, in seconds, after detecting a overflow EAPOL key request after which the check can be resumed. 60-360000秒 900秒 |
溢出的时间 |
Time to wait, in seconds, after detecting a overflow IE after which the check can be resumed. 60-360000秒 900秒 |
电力驱动器式框架 |
The minimum number of Power Management OFF packets that are required to be seen from a station, in intervals of 10 second, in order for the Power Save DoS check to be done. 1-1000 120 |
电力驱动器时间 |
在检测到电源节省DOS攻击之后,可以在几秒钟内等待,然后可以恢复检查。 60-360000秒 900秒 |
电力驱动阈值 |
The Power Management ON packets sent by a station as a percentage of the Power Management OFF packets sent, in intervals of 10 second, which will trigger this event. 1- 100% 80% |
probe-request-rate-thresholds <探针 - 重新定价阈值> |
Rate threshold for probe request frames. |
probe-response-rate-thresholds |
探针响应帧的速率阈值。 |
RTS-rate-Quiet时间 |
Time to wait, in seconds, after detecting an RTS rate anomaly after which the check can be resumed. 60-360000秒 900秒 |
rts-rate-threshold |
Number of RTS control packets over the time interval that constitutes an anomaly. 0-100000 5000 |
RTS利率时间间隔 |
Time interval, in seconds, over which the packet count should be checked. 1-120秒 5秒 |
tkip-replay-quiet-time |
Time to wait, in seconds, after detecting a TKIP replay attack after which the check can be resumed. 60-360000秒 900秒 |
wpa-ft-Quiet时间 |
Time to wait, in seconds, after detecting a WPA FT attack after which the check can be resumed. 60-360000秒 900秒 |
wpa-ft-threshold |
Number of reassociation management packets for a particular client over the time interval that constitutes a WPA FT attack. 0-100000 45 |
wpa-ft时间间隔 |
Time interval, in seconds, over which the packet count should be checked. 1-120秒 60seconds |
Example
The following command enables a detection in the DoS profile named “floor2”:
(host) [mynode] (config) #ids dos-profile floor2
(host) [mynode] (IDS Denial Of Service Profile "floor2") detect-ap-flood
Related Command
Command |
Description |
Displays the IDS DoS profile. |
Command History
Release |
Modification |
ArubaOS8。10.0.0 |
添加了以下参数:
|
ArubaOS8。6.0.0 |
删除 |
ArubaOS8.2.0.0 |
添加了以下参数:
|
ArubaOS8.0.0.0 |
介绍了命令。 |
命令信息
Platforms |
License |
Command Mode |
All platforms |
需要RFProtect许可证。 |
配置模式开Mobility Conductor。 |