Understanding Client Intrusion Protection
The following are the client intrusion protection features with their related commands.
Protecting Valid Stations
Protecting a valid client involves disconnecting that client if it is associated to a non-valid AP.
To protect valid stations access theCLICommand-Line Interface. A console interface with a command line shell that allows users to execute text input as commands and convert these commands to appropriate functions.and enter the following command in the configuration mode:
ids unauthorized-device-profile
Protecting Windows Bridge
Protecting from a Windows Bridge involves containing the client that is forming the bridge so that it can not connect to the AP.
To protect Windows bridge access theCLICommand-Line Interface. A console interface with a command line shell that allows users to execute text input as commands and convert these commands to appropriate functions.and enter the following command in the configuration mode:
ids unauthorized-device-profile