Reference Guide

276 | ids unauthorized-device-profile Dell PowerConnect W-Series ArubaOS 6.1 CLI | Reference Guide
clone Name of an existing IDS rate thresholds profile from
which parameter values are copied.
——
detect-adhoc-network Enable detection of adhoc networks. false
detect-adhoc-using-valid-
ssid
Enable/disable detection of adhoc networks using
valid/protected SSIDs
enable
detect-bad-wep Enables detection of WEP initialization vectors that
are known to be weak and/or repeating. A primary
means of cracking WEP keys is to capture 802.11
frames over an extended period of time and search for
implementations that are still used by many legacy
devices.
false
detect-ht-greenfield Enables or disables detection of high-throughput
devices advertising greenfield preamble capability.
false
detect-invalid-mac-oui Enables checking of the first three bytes of a MAC
address, known as the organizationally unique
identifier (OUI), assigned by the IEEE to known
manufacturers. Often clients using a spoofed MAC
address do not use a valid OUI and instead use a
randomly generated MAC address. Enabling MAC OUI
checking causes an alarm to be triggered if an
unrecognized MAC address is in use.
false
detect-misconfigured-ap Enables detection of misconfigured APs. An AP is
classified as misconfigured if it is classified as valid
and does not meet any of the following configurable
parameters:
- valid channels
- encryption type
- list of valid AP MAC OUIs
- valid SSID list
false
detect-sta-assoc-to-rogue Enable/disable detection of station association to
rogue AP.
enable
detect-unencrypted-valid-
client
Enable/disable detection of unencrypted valid clients. enable
detect-valid-client-
misassociation
Enable/disable detection of misassociation between a
valid client and an unsafe AP
enable
detect-valid-ssid-misuse Enable/disable detection of Interfering or Neighbor
APs using valid/protected SSIDs
disable
detect-windows-bridge Enables detection of Windows station bridging. true
detect-wireless-bridge Enables detection of wireless bridging. false
mac-oui-quiet-time Time, in seconds, that must elapse after an invalid
MAC OUI alarm has been triggered before another
identical alarm may be triggered.
60-360000
seconds
900
seconds
no Negates any configured parameter.
oui-classification Enable/disable OUI based rogue AP classification enable
overlay-classification Enable/disable overlay rogue AP classification enable
privacy Enables encryption as a valid AP configuration. false
prop-wm-classification Enable/disable rogue AP classification through
propagated wired MACs
true
Parameter Description Range Default