| Access | Type |
|---|---|
| readonly | beacon-flood(1), probe-req-flood(2), auth-flood(3), assoc-flood(4), disassoc-flood(5), deauth-flood(6), eap-flood(7), ap-impersonation(8), disassoc-attack(9), deauth-attack(10), duration-attack(11), mic-error-attack(12), null-probe-resp(13), seq-num-anomaly(14), sta-impersonation(15), sta-broadcast(16), evil-twin-attack(17), rf-jamming(18) |