Reference Guide

Table Of Contents
Dell PowerConnect ArubaOS 5.0 Command Line Interface | Reference Guide ids unauthorized-device-profile | 265
Example
The following command copies the settings from the ids-unauthorized-device-disabled profile and then enables
detection and protection from adhoc networks:
ids unauthorized-device-profile unauth1
clone ids-unauthorized-device-disabled
detect-adhoc-network
protect-adhoc-network
Suspected rogue containment
confidence level
60 60 60
Protect valid stations false false true
Detect bad WEP false true true
Detect misconfigured AP false true true
Protect misconfigured AP false false true
Protect SSID false false true
Privacy false false true
Require WPA false true false
Valid 802.11g channel for policy
enforcement
——
Valid 802.11a channel for policy
enforcement
——
Valid MAC OUIs
Valid and protected SSIDs
Protect 802.11n High-throughput
Devices
false false true
Protect 40 MHz 802.11n High-
throughput Devices
false false true
Detect Active 802.11n Greenfield
Mode
false true true
Parameter
ids-unauthorized-
device-disabled
ids-unauthorized-device-
medium-setting
ids-unauthorized-high-
setting