Concept Guide

Parameter Description Range Default
containment and suspect-rogue-conf-
level parameters in the ids
unauthorized-device-profile.
wireless-containment
deauth-only
none
tarpit-all-sta
tarpit-non-valid-sta
Enable wireless containment including
Tarpit Shielding. Tarpit shielding works
by steering a client to a tarpit so that the
client associates with it instead of the AP
that is being contained.
deauth-only—Containment using
deauthentication only.
none—Disable wireless containment.
tarpit-all-sta—Wireless containment by
tarpit of all stations.
tarpit-non-valid-sta—Wireless
containment by tarpit of non-valid
clients.
deaut
h-
only
wireless-containment-debug
Enable/disable debug of containment
from the wireless side.
Note: Enabling this debug option will
cause containment to not function
properly.
true
false
false
Usage Guidelines
This command configures general IDS profile attributes.
Example
The following command enables containment in the general IDS profile:
(host) (config) #ids general-profile floor7
(host) (IDS General Profile "floor7") #wired-containment
(host) (IDS General Profile "floor7") #wireless-containment tarpit-all-sta
(host) (IDS General Profile "floor7") #wireless-containment-debug
Command History
Version Description
ArubaOS 3.0 Command introduced.
ArubaOS 5.0 Introduced the mobility-manager-rtls parameter.
ArubaOS 6.0 Deprecated predefined profiles and added numerous General profile options
Dell Networking W-Series ArubaOS 6.5.x | Reference Guide ids general-profile | 418