
ADVANCED-WIPS-POLICY 10 - 5
[crackable-wep-iv-used|
dos-deauthentication-
detection|dos-disassociation-
detection|dos-eap-failure-
spoof|dos-rts-flood|essid-jack-
attack-detected|fake-dhcp-
server-detected|fata-jack-
detected|id-theft-eapol-
success-spoof-detected|id-
theft-out-of-sequence|invalid-
channel-advertized|invalid-
management-frame|ipx-
detection|monkey-jack-attack-
detected|multicast-all-routers-
on-subnet|multicast-all-
systems-on-subnet|multicast-
dhcp-server-relay-
agent|multicast-hsrp-
agent|multicast-igmp-
detection|multicast-igmp-
routers-detection|multicast-
ospf-all-routers-
detection|multicast-ospf-
designated-routers-
detection|multicast-rip2-
routers-detection
• crackable-wep-iv-used – Detects crackable WEP IV used
• dos-deauthentication-detection – Detects DoS deauthentication
• dos-disassociation-detection – Detects DoS disassociation
• dos-eap-failure-spoof – Detects a DoS EAP failure spoof
• dos-rts-flood – Detects a DoS RTS flood
• essid-jack-attack-detected – Detects an ESSID jack attack
• fake-dhcp-server-detected – Detects a fake DHCP server
• fata-jack-detected – Detects a fata-jack attack
• id-theft-eapol-success-spoof-detected – Detects an ID theft - EAPOL
success spoof
• id-theft-out-of-sequence – Detects an ID theft - out of sequence
• invalid-channel-advertized – Detects an invalid channel advertizement
• invalid-management-frame – Detects an invalid management frame
• ipx-detection – Detects IPX
• monkey-jack-attack-detected – Detects a monkey-jack attack
• multicast-all-routers-on-subnet – Detects all multicast routers in the
subnet
• multicast-all-systems-on-subnet – Detects all multicast systems on
the subnet
• multicast-dhcp-server-relay-agent – Detects multicast DHCP server
relay agents
• multicast-hsrp-agent – Detects multicast HSRP agents
• multicast-igmp-detection – Detects multicast IGMP
• multicast-igrp-routers-detection – Detects multicast IGRP routers
• multicast-ospf-all-routers-detection – Detects multicast OSPF all
routers
multicast-vrrp-agent|netbios-
detection|null-probe-response-
detected|stp-
detection|windows-zero-
config-multicast-rip2-routers-
detection|memory-leak|wlan-
jack-attack-detected] trigger-
against
{neighboring|sanctioned|unsa
nctioned}
• multicast-ospf-designated-routers-detection – Detects multicast
OSPF designated routers
• multicast-rip2-routers-detection – Detects multicast RIP2 routers
• multicast-vrrp-agent – Detects multicast VRRP agents
• netbios-detection – Detects NetBIOS
• null-probe-response-detected – Detects null probe response
• stp-detection – Detects STP
• windows-zero-config-memory-leak – Detects windows zero config
memory leak
• wlan-jack-attack-detected – Detects WLAN jack attacks
The following parameters are common for all the above:
• trigger-against{neighboring|sanctioned|unsanctioned – Sets the
trigger from the list
• neighboring – Triggers against Neighboring (Ignored) devices
• sanctioned – Triggers against Sanctioned (sanctioned) devices
• unsanctioned – Triggers against Unsanctioned (Unsanctioned)
devices
Kommentare zu diesen Handbüchern