Release Notes
395 | ids unauthorized-device-profile Dell Networking W-Series ArubaOS 6.4.x| Reference Guide
Parameter Description Range
Defaul
t
rogue-containment
Rogue APs can be detected (see
classification) but are not automatically
disabled. This option automatically shuts
down rogue APs. When this option is
enabled (true), clients attempting to
associate to an AP classified as a rogue
are disconnected through a denial of
service attack.
— false
suspect-rogue-conf-level
Confidence level of suspected Rogue AP to
trigger containment.
When an AP is classified as a suspected
rogue AP, it is assigned a 50% confidence
level. If multiple APs trigger the same
events that classify the AP as a suspected
rogue, the confidence level increases by
5% up to 95%.
In combination with suspected rogue
containment, this option configures the
threshold by which containment should
occur. Suspected rogue containment
occurs only when the configured
confidence level is met.
50-
100%
60%
suspect-rogue-containment
Suspected rogue APs are treated as
interfering APs, thereby the controller
attempts to reclassify them as rogue APs.
Suspected rogue APs are not automatically
contained. In combination with the
configured confidence level (see suspect-
rogue-conf-level), this option contains the
suspected rogue APs.
— false
unencrypted-valid-client-
quiet-time
Time to wait, in seconds, after detecting an
unencrypted valid client after which the
check can be resumed.
60-
360000
second
s
900
seconds
valid-and-protected-ssid
List of valid and protected SSIDs. — —
valid-oui
List of valid MAC OUIs. — —
valid-wired-mac
List of MAC addresses of wired devices in
the network, typically gateways or servers.
— —
wireless-bridge-quiet-time
Time, in seconds, that must elapse after a
wireless bridge alarm has been triggered
before another identical alarm may be
triggered.
60-
360000
second
s
900
seconds
wireless-hosted-network-quiet-
time
The wireless hosted network detection
feature sends a log message and trap
when a wireless hosted network is
detected. The quiet time defined by this
parameter sets the amount of time, in
seconds, that must elapse after a wireless
hosted network log message or trap has
been triggered before an identical log
message or trap can be sent again.
60-
360000
second
s
900
seconds