Reference Guide

Table Of Contents
264 | ids unauthorized-device-profile Dell PowerConnect ArubaOS 5.0 Command Line Interface | Reference Guide
Usage Guidelines
Unauthorized device detection includes the ability to detect and disable rogue APs and other devices that can
potentially disrupt network operations.
There are three predefined unauthorized device profiles, each of which provides different levels of detection and
containment. The following describes the settings for each of the predefined profiles:
suspect-rogue-
containment
Suspected rogue APs are treated as interfering APs, thereby the controller
attempts to reclassify them as rogue APs. Suspected rogue APs are not
automatically contained. In combination with the configured confidence level
(see suspect-rogue-conf-level), this option contains the suspected rogue
APs.
—false
valid-and-pro
tected-ssid
List of valid and protected SSIDs.
valid-oui List of valid MAC OUIs.
valid-wired-mac List of MAC addresses of wired devices in the network, typically gateways or
servers.
——
wireless-bridge
-quiet-time
Time, in seconds, that must elapse after a wireless bridge alarm has been
triggered before another identical alarm may be triggered.
60-360000 900
seconds
Parameter Description Range Default
Note: AP configuration settings related to the IEEE 802.11n standard are configurable for W-AP120 series access points, which are
IEEE 802.11n standard compliant devices.
Parameter
ids-unauthorized-
device-disabled
ids-unauthorized-device-
medium-setting
ids-unauthorized-high-
setting
Detect adhoc networks false true true
Protect from adhoc networks false false true
Detect windows bridge false true true
Detect wireless bridge false true true
Detect devices with invalid MAC
OUI
false false true
MAC OUI detection quiet time 900 seconds 900 seconds 900 seconds
Adhoc network detection quiet
time
900 seconds 900 seconds 900 seconds
Wireless bridge detection quiet
time
900 seconds 900 seconds 900 seconds
Rogue AP classification false true true
Overlay rogue AP classification true true true
Valid wired MACs
Rogue containment false false true
Allow well known MAC
Suspected rogue containment false false false