Reference Guide

Table Of Contents
Dell PowerConnect W-Series ArubaOS 6.1 CLI | Reference Guide ids unauthorized-device-profile | 275
Syntax
Parameter Description Range Default
<profile> Name that identifies an instance of the profile. The
name must be 1-63 characters.
“default”
adhoc-quiet-time DEPRECATED
adhoc-using-valid-ssid-
quiet-time
Time to wait, in seconds, after detecting an adhoc
network using a valid SSID, after which the check can
be resumed.
60-360000 900
seconds
allow-well-known-mac Allows devices with known MAC addresses to
classify rogues APs.
Depending on your network, configure one or more of
the following options for classifying rogue APs:
hsrp—Routers configured for HSRP, a Cisco-
proprietary redundancy protocol, with the HSRP MAC
OUI 00:00:0c.
iana—Routers using the IANA MAC OUI 00:00:5e.
local-mac—Devices with locally administered MAC
addresses starting with 02.
vmware—Devices with any of the following VMWare
OUIs: 00:0c:29, 00:05:69, or 00:50:56
vmware1—Devices with VMWare OUI 00:0c:29.
vmware2—Devices with VMWare OUI 00:05:69.
vmware3—Devices with VMWare OUI 00:50:56.
If you modify an existing configuration, the new
configuration overrides the original configuration. For
example, if you configure allow-well-known-
mac hsrp and then configure allow-well-
known-mac iana, the original configuration is lost.
To add more options to the original configuration,
include all of the required options, for example:
allow-well-known-mac hsrp iana.
Use caution when configuring this command. If the
neighboring network uses similar routers, those APs
might be classified as rogues. If containment is
enabled, clients attempting to associate to an AP
classified as a rogue are disconnected through a
denial of service attack.
To clear the well known MACs in the system, use the
following commands on all controllers:
clear wms wired-mac
This clears all of the learned wired MAC information
on the controller.
reload
This reboots the controller.
——
cfg-valid-11a-channel List of valid 802.11a channels that third-party APs are
allowed to use.
34-165 N/A
cfg-valid-11g-channel List of valid 802.11b/g channels that third-party APs
are allowed to use.
1-14 N/A
classification Enable/disable rogue AP classification. A rogue AP is
one that is unauthorized and plugged into the wired
side of the network. Any other AP seen in the RF
environment that is not part of the valid enterprise
network is considered to be interfering it has the
potential to cause RF interference but it is not
connected to the wired network and thus does not
represent a direct threat.
true