ids impersonation-profile
ids impersonation-profile
ap-spoofing-quiet-time
beacon-diff-threshold
beacon-inc-wait-time
beacon-wrong-channel-quiet-time
chan-based-mitm-quiet-time
clone
detect-ap-impersonation
detect-ap-spoofing
detect-beacon-wrong-channel
detect-chan-based-mitm
detect-hotspotter
hotspotter-quiet-time
no
protect-ap-impersonation
Description
This command configures anomalies for impersonation attacks.
Parameter |
Description |
Name that identifies an instance of the profile. 1-63 characters "default" |
|
ap-spoofing-quiet-time |
Time to wait, in seconds, after detecting AP Spoofing after which the check can be resumed. 60-360000 seconds 60 seconds |
beacon-diff-threshold |
Percentage increase, in beacon rates, that triggers an AP impersonation event. 0-100% 50% |
beacon-inc-wait-time |
Time, in seconds, after the beacon difference threshold is crossed before an AP impersonation event is generated. 3 seconds |
beacon-wrong-channel-quiet-time |
Time to wait, in seconds, after detecting a beacon with the wrong channel after which the check can be resumed. 60-360000 seconds 900 seconds |
chan-based-mitm-quiet-time |
Time to wait, in seconds, after detecting man-in-the-middle attack after which the check can be resumed. 60-360000 seconds 900 seconds |
clone |
Name of an existing IDS impersonation profile from which parameter values are copied. |
detect-ap-impersonation |
Enables or disables detection of AP impersonation. In AP impersonation attacks, the attacker sets up an AP that assumes the BSSID and ESSID of a valid AP or a neighboring AP. AP impersonation attacks can be done for man-in-the-middle attacks, a rogue AP attempting to bypass detection, or a honeypot attack. enabled |
detect-ap-spoofing |
Enables or disables AP Spoofing detection. enabled |
detect-beacon-wrong-channel |
Enables or disables detection of beacons advertising the incorrect channel. disabled |
detect-chan-based-mitm |
Enables or disables channe-based man-in-the-middle attack detection. disabled |
detect-hotspotter |
Enables or disables detection of the Hotspotter attack to lure away valid clients. disabled |
hotspotter-quiet-time |
Time to wait, in seconds, after detecting an attempt to use the Hotspotter tool against clients. 60-360000 seconds 900 seconds |
no |
Negates any configured parameter. |
protect-ap-impersonation |
When AP impersonation is detected, both the legitimate and impersonating AP are disabled using a denial of service attack. disabled |
Example
The following command enables detections in the impersonation profile:
(host) [mynode] (config) #ids impersonation-profile floor1
(host) [mynode] (IDS Impersonation Profile "floor1") #detect-beacon-wrong-channel
(host) [mynode] (IDS Impersonation Profile "floor1") #detect-ap-impersonation
Related Command
Command |
Description |
Displays the IDS impersonation profile. |
Command History
Release |
Modification |
ArubaOS8.2.0.0 |
The following parameters were added:
|
ArubaOS8.0.0.0 |
Command Introduced. |
Command Information
Platforms |
License |
Command Mode |
All platforms |
需要RFprotectlicense. |
Config mode onMobility Conductor. |