Motorola Wing 5 Manual
Have a look at the manual Motorola Wing 5 Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 249 Motorola manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
WIPS-POLICY 22 - 7 • event enable-all-events • event excessive [80211-replay-check-failure|aggressive-scanning| auth-server-failures|decryption-failures|dos-assoc-or-auth-flood| dos-eapol-start-storm |dos-unicast-deauth-or-disassoc|eap-flood|eap-nak-flood| frames-from-unassoc-station] {filter-ageout []|threshold-client []| threshold-radio []} wellenreiter Tracks Wellenreiter events filter-ageout The following are common to all of the above client anomaly events: Optional. Configures the filter expiration interval in seconds – Sets the filter ageout interval from 0 - 86400 seconds. The default is 0 seconds. enable-all-events Enables tracking of all intrusion events (client anomaly and excessive events) excessive Enables the tracking of excessive events. Excessive events are actions performed continuously and repetitively 80211-replay-check-failure Tracks 802.11replay check failure aggressive-scanning Tracks aggressive scanning events auth-server-failures Tracks failures reported by authentication servers decryption-failures Tracks decryption failures dos-assoc-or-auth-flood Tracks DoS association or authentication floods dos-eapol-start-storm Tracks DoS EAPOL start storms dos-unicast-deauth-or- disassocTracks DoS dissociation or deauthentication floods eap-flood Tracks EAP floods eap-nak-flood Tracks EAP NAK floods frames-from-unassoc-station Tracks frames from unassociated clients filter-ageout Optional. Configures a filter expiration interval in seconds. It sets the duration for which the client is filtered. The client is added to a ACL as a special entry and frames received from this client are dropped. – Sets a filter ageout interval from 0 - 86400 seconds. The default is 0 seconds. threshold-client Optional. Configures a client threshold value after which the filter is triggered and an event is recorded – Sets a wireless client threshold value from 0 - 65535 seconds threshold-radio Optional. Configures a radio threshold value after which the filter is triggered and an event is recorded – Sets a radio threshold value from 0 - 65535 seconds
22 - 8 WiNG CLI Reference Guide Examples rfs7000-37FABE(config-wips-policy-test)#event excessive 80211-replay-check-failure filter-ageout 9 threshold-client 8 threshold-radio 99 rfs7000-37FABE(config-wips-policy-test)#event client-anomaly wellenreiter filter- ageout 99 rfs7000-37FABE(config-wips-policy-test)#show context wips-policy test event client-anomaly wellenreiter filter-ageout 99 event excessive 80211-replay-check-failure threshold-client 8 threshold-radio 99 filter-ageout 9 ap-detection-ageout 50 ap-detection-wait-time 15 rfs7000-37FABE(config-wips-policy-test)# Related Commands noDisables WIPS policy events
WIPS-POLICY 22 - 9 22.1.4 history-throttle-duration wips-policy Configures the duration event duplicates are omitted from the event history Supported in the following platforms: AP300 AP621 AP650 AP6511 AP6521 AP6532 AP71XX RFS4000 RFS6000 RFS7000 NX9000 NX9500 Syntax history-throttle-duration Parameters • history-throttle-duration Examples rfs7000-37FABE(config-wips-policy-test)#history-throttle-duration 77 rfs7000-37FABE(config-wips-policy-test)#show context wips-policy test history-throttle-duration 3000 event client-anomaly wellenreiter filter-ageout 99 event excessive 80211-replay-check-failure threshold-client 8 threshold-radio 99 filter-ageout 9 ap-detection-ageout 50 ap-detection-wait-time 15 Related Commands history-throttle-duration Configures the duration event duplicates are omitted from the event history – Sets a value from 30 - 86400 seconds. The default is 120 seconds. noResets the history throttle duration to its default
22 - 10 WiNG CLI Reference Guide 22.1.5 no wips-policy Negates a command or resets configured settings to their default. When used in the config WIPS policy mode, the no command negates or resets filters and threshold values. Supported in the following platforms: AP300 AP621 AP650 AP6511 AP6521 AP6532 AP71XX RFS4000 RFS6000 RFS7000 NX9000 NX9500 Syntax no [ap-detection|enable|event|history-throttle-duration|signature|use] no [enable|history-throttle-duration] no ap-detection [ageout|wait-time] [] no event [ap-anomaly|client-anomaly|enables-all-events|excessive] no event ap-anomaly [ad-hoc-violation|airjack|ap-ssid-broadcast-in-beacon|asleap| impersonation-attack|transmitting-device-using-invalid-mac|wireless-bridge] no event client-anomaly [crackable-wep-iv-key-used|dos-broadcast-deauth| fuzzing-all-zero-macs|fuzzing-invalid-frame-type|fuzzing-invalid-mgmt-frames| fuzzing-invalid-seq-num|identical-src-and-dest-addr|invalid-8021x-frames| netstumbler-generic|non-changing-wep-iv|tkip-mic-counter-measures|wellenreiter] {filter-ageout []} no event excessive [80211-replay-check-failure|aggressive-scanning| auth-server-failures|decryption-failures|dos-assoc-or-auth-flood| dos-eapol-start-storm |dos-unicast-deauth-or-disassoc|eap-flood|eap-nak-flood| frames-from-unassoc-station] {filter-ageout []| threshold-client []|threshold-radio []} no signature no use device-categorization Parameters • no [enable|history-throttle-duration] no enable Disables a WIPS policy from use with a wireless controller profile no history-throttle-duration Resets the history throttle duration to its default. This is the duration event duplicates are omitted from the event history.
WIPS-POLICY 22 - 11 • no ap-detection [ageout|wait-time] [] • no event ap-anomaly [ad-hoc-violation|airjack|ap-ssid-broadcast-in-beacon| asleap|impersonation-attack|transmitting-device-using-invalid-mac|wireless-bridge] • no event client-anomaly [crackable-wep-iv-key-used|dos-broadcast-deauth| fuzzing-all-zero-macs|fuzzing-invalid-frame-type|fuzzing-invalid-mgmt-frames| fuzzing-invalid-seq-num|identical-src-and-dest-addr|invalid-8021x-frames| netstumbler-generic|non-changing-wep-iv|tkip-mic-counter-measures|wellenreiter] {filter-ageout []} no ap-detection Disables the detection of unauthorized or unsanctioned APs ageout Resets the ageout interval of a rogue device to its default (300 seconds) wait-time Resets the wait time period to its default (60 seconds) no event Disables WIPS policy event tracking settings ap-anomaly Disables AP anomaly event tracking ad-hoc-violation Disables adhoc network violation event tracking airjack Disables the tracking of AirJack attacks ap-ssid-broadcast-in-beacon Disables the tracking of AP SSID broadcasts in beacon events asleap Disables the tracking of ASLEAP attacks impersonation-attack Disables the tracking of impersonation attacks transmitting-device-using- invalid-macDisables the tracking of invalid device MAC addresses wireless-bridge Disables the tracking of wireless bridge frames no event Disables WIPS policy event tracking settings client-anomaly Disables client anomaly event tracking crackable-wep-iv-key-used Disables the tracking of the use of a crackable WEP IV Key dos-broadcast-deauth Disables DoS broadcast deauthentication event tracking fuzzing-all-zero-macs Disables the tracking of Fuzzing: All zero MAC addresses observed fuzzing-invalid-frame-type Disables the tracking of Fuzzing: Invalid frame type detected fuzzing-invalid-mgmt-frames Disables the tracking of Fuzzing: Invalid management frame fuzzing-invalid-seq-num Disables the tracking of Fuzzing: Invalid sequence number identical-src-and-dest-addr Disables the tracking of identical source and destination addresses invalid-8021x-frames Disables the tracking of Fuzzing: Invalid 802.1x frames netstumbler-generic Disables Netstumbler (v3.2.0, 3.2.3, 3.3.0) event tracking non-changing-wep-iv Disables unchanging WEP IV event tracking
22 - 12 WiNG CLI Reference Guide • no event excessive [80211-replay-check-failure|aggressive-scanning| auth-server-failures|decryption-failures|dos-assoc-or-auth-flood| dos-eapol-start-storm |dos-unicast-deauth-or-disassoc|eap-flood|eap-nak-flood| frames-from-unassoc-station] {filter-ageout []| threshold-client []|threshold-radio []} • no signature tkip-mic-counter-measures Disables the tracking of TKIP MIC counter measures caused by a client wellenreiter Disables Wellenreiter event tracking filter-ageout The following are common to all of the above client anomaly events: Optional. Resets the filter expiration interval in seconds – Resets a filter ageout interval from 0 - 86400 seconds no event Disables WIPS policy event tracking settings excessive Disables the tracking of excessive events. Excessive events consist of actions that are performed continuously and repetitively 80211-replay-check-failure Disables the tracking of 802.11 replay check failure aggressive-scanning Disables aggressive scanning event tracking auth-server-failures Disables the tracking of failures reported by authentication servers decryption-failures Disables the tracking of decryption failures dos-assoc-or-auth-flood Disables DoS association or authentication flood tracking dos-eapol-start-storm Disables the tracking of DoS EAPOL start storms dos-unicast-deauth-or- disassocDisables DoS disassociation or deauthentication flood tracking eap-flood Disables the tracking of EAP floods eap-nak-flood Disables the tracking of EAP NAKfloods frames-from-unassoc-station Disables the tracking of frames from unassociated clients filter-ageout Optional. Resets the filter expiration interval in seconds. It resets the duration for which a client is filtered. The client is added to a ACL as a special entry and frames received from this client are dropped. – Resets a filter ageout interval from 0 - 86400 seconds threshold-client Optional. Resets a client threshold limit after which the filter is triggered and an event is recorded in events history – Resets a wireless client threshold limit from 0 - 65535 seconds threshold-radio Optional. Resets a radio threshold limit after which an event is recorded to events history – Resets a radio threshold limit from 0 - 65535 seconds no signature Deletes a WIPS policy signature Defines the unique name given to a WIPS policy signature
WIPS-POLICY 22 - 13 • no use device-categorization Usage Guidelines The no command negates any command associated with it. Wherever required, use the same parameters associated with the command getting negated. Examples rfs7000-37FABE(config-wips-policy-test)#show context wips-policy test history-throttle-duration 3000 event client-anomaly wellenreiter filter-ageout 99 event excessive 80211-replay-check-failure threshold-client 8 threshold-radio 99 filter-ageout 9 ap-detection-ageout 50 ap-detection-wait-time 15 rfs7000-37FABE(config-wips-policy-test)#no history-throttle-duration rfs7000-37FABE(config-wips-policy-test)#no event excessive 80211-replay-check- failure threshold-client 8 threshold-radio 99 filter-ageout 9 rfs7000-37FABE(config-wips-policy-test)#show context wips-policy test event client-anomaly wellenreiter filter-ageout 99 no event excessive 80211-replay-check-failure threshold-client 8 threshold-radio 99 filter-ageout 9 ap-detection-ageout 50 ap-detection-wait-time 15 Related Commands no use Disables the use of a device categorization policy with this WIPS policy device-categorization Resets the device categorization name to its default ap-detectionEnables the detection of unauthorized or unsactioned access points enableEnables a WIPS policy for use with a wireless controller profile eventConfigures events, filters, and threshold values for a WIPS policy history-throttle-durationConfigures the duration for which event duplicates are omitted from the event history signatureConfigures a WIPS policy signature useEnables the categorization of devices on this WIPS policy
22 - 14 WiNG CLI Reference Guide 22.1.6 signature wips-policy Attack and intrusion patterns are identified and configured as signatures in a WIPS policy. The WIPS policy compares packets in the network with pre configured signatures to identify threats. When a threat is identified, the WIPS policy takes adequate actions. signatureConfigures a WIPS policy signature signature mode commandsSummarizes the signature mode commands
WIPS-POLICY 22 - 15 22.1.6.1 signature signature Configures a WIPS policy signature Supported in the following platforms: AP300 AP621 AP650 AP6511 AP6521 AP6532 AP71XX RFS4000 RFS6000 RFS7000 NX9000 NX9500 Syntax signature Parameters • signature Examples rfs7000-37FABE(config-wips-policy-test)#signature test rfs7000-37FABE(config-test-signature-test)# rfs7000-37FABE(config-test-signature-test)#show context signature test rfs7000-37FABE(config-test-signature-test)# Related Commands signature Configures a WIPS policy signature – Enter a name for the WIPS policy signature. Provide a unique name for the signature, which will distinguish it from other signatures with similar configurations. The name should not exceed 64 characters. noDeletes a WIPS policy signature
22 - 16 WiNG CLI Reference Guide 22.1.6.2 signature mode commands signature Table 22.2 summarizes signature commands Table 22.2signature-mode commands Commands Description Reference bssidConfigures the BSSID MAC addresspage 22-17 dst-macConfigures the destination MAC addresspage 22-18 filter-ageoutConfigures the filter ageout intervalpage 22-19 frame-typeConfigures the frame type used for matchingpage 22-20 modeEnables or disables the signature modepage 22-22 payloadConfigures payload settingspage 22-23 src-macConfigures the source MAC addresspage 22-24 ssid-matchConfigures a match based on SSIDpage 22-25 threshold-clientConfigures the wireless client threshold limitpage 22-26 threshold-radioConfigures the radio threshold limitpage 22-27 noNegates a command or sets its defaultpage 22-28 clrscrClears the display screenpage 5-3 commitCommits (saves) changes made in the current sessionpage 5-4 doRuns commands from EXEC modepage 4-66 endEnds and exits the current mode and moves to the PRIV EXEC modepage 5-5 exitEnds the current mode and moves to the previous modepage 5-6 helpDisplays the interactive help systempage 5-7 revertReverts changes to their last saved configurationpage 5-13 serviceInvokes service commands to troubleshoot or debug (config-if) instance configurationspage 5-14 showDisplays running system informationpage 6-4 writeWrites the system running configuration to memory or terminalpage 5-42