Release Notes

Parameter Description Range Default
min-pot-ap-beacon-rate
Minimum beacon rate acceptable from a
potential AP, in percentage of the
advertised beacon interval.
0-100 25%
min-pot-ap-monitor-time
Minimum time, in seconds, a potential AP
has to be up before it is classified as a real
AP.
2-36000 2
seconds
mobility-manager-rtls
Enable/disable RTLS communication with
the configured mobility-manager
enabled
disabled
disabled
mon-stats-update-interval
Time interval, in seconds, for AP to update
the switch with stats for monitored
devices. Minimum is 60.
60-
360000
seconds
60
seconds
no
Negates any configured parameter.
send-adhoc-info-to-controller
Enable or disable sending Adhoc
information to the controller from the AP.
enable
disable
disable
signature-quiet-time
After a signature match is detected, the
time to wait, in seconds, to resume
checking.
60-
360000
seconds
900
seconds
sta-inactivity-timeout
Time, in seconds, after which a station is
aged out.
30-
360000
seconds
60
seconds
sta-max-unseen-timeout
Ageout time, in seconds, since station was
last seen. Minimum is 5.
5-36000
seconds
5
seconds
wired-containment
Enable containment from the wired side. true
false
false
wired-containment-ap-adj-mac
Enable/disable wired containment of
MACs offset by one from APs BSSID.
true
false
false
wired-containment-susp-l3-rogue
The basic wired containment feature
enabled using the wired-containment
command contains layer-3 APs whose
wired interface MAC addresses are either
the same as (or one character off from)
their BSSIDs. This feature can also identify
and contain an AP with a preset wired
MAC address that is completely different
from the AP’s BSSID if the MAC address
that the AP provides to wireless clients as
the ‘gateway MAC is offset by one
character from its wired MAC address.
NOTE: This feature requires that the
following wired-containment parameter in
the ids general-profile is also enabled, and
that the confidence level of the suspected
rogue exceeds the level configured by the
suspect-rogue-containment and suspect-
rogue-conf-level parameters in the ids
unauthorized-device-profile.
true false
Dell Networking W-Series ArubaOS 6.4.x | Reference Guide ids general-profile | 374