ArubaOS 8.6.0.0Help Center
You are here: Home > Wireless Intrusion Prevention > Intrusion Protection > Understanding Client Intrusion Protection

Understanding Client Intrusion Protection

The following are the client intrusion protection features with their related commands.

Protecting Valid Stations

Protecting a valid client involves disconnecting that client if it is associated to a non-valid AP.

To protect valid stations access theCLICommand-Line Interface. A console interface with a command line shell that allows users to execute text input as commands and convert these commands to appropriate functions.and enter the following command in the configuration mode:

ids unauthorized-device-profile protect-valid-sta

Protecting Windows Bridge

Protecting from a Windows Bridge involves containing the client that is forming the bridge so that it can not connect to the AP.

To protect Windows bridge access theCLICommand-Line Interface. A console interface with a command line shell that allows users to execute text input as commands and convert these commands to appropriate functions.and enter the following command in the configuration mode:

ids unauthorized-device-profile protect-windows-bridge

/*]]>*/
Baidu