Release Notes

Usage Guidelines
Unauthorized device detection includes the ability to detect and disable rogue APs and other devices that can
potentially disrupt network operations.
Example
The following command copies the settings from the ids-unauthorized-device-disabled profile and then
enables detection and protection from adhoc networks:
(host) (config) #ids unauthorized-device-profile floor7
(host) (IDS Unauthorized Device Profile "floor7") #unauth1
(host) (IDS Unauthorized Device Profile "floor7") #clone ids-unauthorized-device-disable
(host) (IDS Unauthorized Device Profile "floor7") #detect-adhoc-network
(host) (IDS Unauthorized Device Profile "floor7") #protect-adhoc-network
Command History
Release Modification
ArubaOS 3.0 Command introduced
ArubaOS 3.3 Update with support for the high-throughput IEEE 802.11n standard. Also,
introduced allow-well-known-mac, suspect-rogue-conf-level, and suspect-
rogue-containment parameters.
ArubaOS 6.0 Deprecated predefined profiles
ArubaOS 6.1 Added the detect-valid-ssid-misuse parameter to internally generate a list
of valid SSIDs to use in addition to the user configured list of Valid and
Protected SSIDs.
ArubaOS 6.3 Added the following parameters
l protect-adhoc-enhanced
l detect-wireless-hosted-network
l wireless-hosted-network-quiet-time
l protect-wireless-hosted-network
Deprecated Predefined Profiles
IDS Unauthorized Device profile:
l ids-unauthorized-device-disabled
l ids-unauthorized-device-medium-setting
l ids-unauthorized-device-high-setting
Command Information
Platform License Command Mode
Available on all platforms Requires the RFprotect license Config mode on master
controllers
Dell Networking W-Series ArubaOS 6.4.x | Reference Guide ids unauthorized-device-profile | 396