CLI Reference Guide

Syntax
Parameter Description Range Default
<profile>
Name that identifies an instance of the profile. The
name must be 1-63 characters.
“default”
adhoc-using-valid-ssid-quiet-
time
Time to wait, in seconds, after detecting an adhoc
network using a valid SSID, after which the check
can be resumed.
60-
360000
900
seconds
allow-well-known-mac
Allows devices with known MAC addresses to
classify rogues APs.
Depending on your network, configure one or more
of the following options for classifying rogue APs:
l hsrp—Routers configured for HSRP, a Cisco-
proprietary redundancy protocol, with the HSRP
MAC OUI 00:00:0c.
l iana—Routers using the IANA MAC OUI
00:00:5e.
l local-mac—Devices with locally administered
MAC addresses starting with 02.
l vmware—Devices with any of the following
VMWare OUIs: 00:0c:29, 00:05:69, or 00:50:56
l vmware1—Devices with VMWare OUI 00:0c:29.
l vmware2—Devices with VMWare OUI 00:05:69.
l vmware3—Devices with VMWare OUI 00:50:56.
If you modify an existing configuration, the new
configuration overrides the original configuration.
For example, if you configure allow-well-
known-mac hsrp and then configure allow-
well-known-mac iana, the original
configuration is lost. To add more options to the
original configuration, include all of the required
options, for example: allow-well-known-mac
hsrp iana.
Use caution when configuring this command. If the
neighboring network uses similar routers, those
APs might be classified as rogues. If containment is
enabled, clients attempting to associate to an AP
classified as a rogue are disconnected through a
denial of service attack.
To clear the well known MACs in the system, use
the following commands:
l clear wms wired-mac:This clears all of
the learned wired MAC information on the
controller.
l reload: This reboots the controller.
cfg-valid-11a-channel
List of valid 802.11a channels that third-party APs
are allowed to use.
34-165 N/A
cfg-valid-11g-channel
List of valid 802.11b/g channels that third-party APs
are allowed to use.
1-14 N/A
classification
Enable/disable rogue AP classification. A rogue AP
is one that is unauthorized and plugged into the
true
Dell PowerConnect W-Series ArubaOS 6.2 | Reference Guide ids unauthorized-device-profile | 305