ids unauthorized-device-profile
ids unauthorized-device-profile
Adhoc-using-ssid-Quiet-Quiet-Quiet-Quiet
allow-well-known-mac [hsrp|iana|local-mac|vmware|vmware1|vmware2|vmware3]
CFG-VALID-11A-CHANNEL
cfg-valid-11g-channel
classification
clone
检测 - 阿德霍克网络
detect-adhoc-using-valid-ssid
detect-bad-wep
detect-ht-greenfield
detect-invalid-mac-oui
detect-misconfigured-ap
detect-sta-assoc-to-rogue
检测到未结晶的valid-client
detect-valid-client-misassociation
detect-valid-ssid-misuse
detect-windows-bridge
detect-wireless-bridge
检测无线托管 -网络
mac-oui-quiet-time
不
OUI分类
overlay-classification
privacy
Prop-WM分类
保护赞美剂
保护添加剂网络
保护阿多克 -valid-ssid
protect-high-throughput
Protect-HT-40MHz
保护合并的AP
protect-ssid
protect-valid-sta x
保护Windows-Bridge
protect-wireless-hosted-network
需要WPA
rogue-containment
可疑流-CONF级
suspect-rogue-containment
unencrypted-valid-client-quiet-time
valid-and-protected-ssid
valid-oui
有效连接的-MAC <有效连接-MAC>
无线桥 - 超时<无线桥 - 奎特时间>
无线托管网络Quiet时间<无线托管网络Quiet-time>
Description
This command configures detection of unauthorized devices, as well as rogue AP detection and containment. Unauthorized device detection includes the ability to detect and disable rogue APs and other devices that can potentially disrupt network operations.
Parameter |
Description |
Name that identifies an instance of the profile. 1-63 characters |
|
adhoc-using-valid-ssid- quiet-time |
在使用有效的SSID检测到临时网络之后,可以在几秒钟内等待,然后可以恢复检查。 60-360000 seconds 900 seconds |
allow-well-known-mac |
允许具有已知MAC地址的设备来对Rogues AP进行分类。 Depending on your network, configure one or more of the following options for classifying rogue APs:
If you modify an existing configuration, the new configuration overrides the original configuration. For example, if you configure Use caution when configuring this command. If the neighboring network uses similar routers, those APs might be classified as rogues. If containment is enabled, clients attempting to associate to an AP classified as a rogue are disconnected through a denial of service attack. To clear the well known MACs in the system, use the following commands:
|
CFG-VALID-11A-CHANNEL |
List of valid 802.11a channels that third-party APs are allowed to use. 34-165 |
cfg-valid-11g-channel |
List of valid 802.11b/g channels that third-party APs are allowed to use. 1-14 |
classification |
Enables or disables rogue AP classification. A rogue AP is one that is unauthorized and plugged into the wired side of the network. Any other AP seen in the RF environment that is not part of the valid enterprise network is considered to be interfering — it has the potential to cause RF interference but it is not connected to the wired network and thus does not represent a direct threat. |
clone |
现有IDS速率阈值的名称复制参数值的名称。 |
检测 - 阿德霍克网络 |
Enables or disables detection of ad hoc networks. |
detect-adhoc-using-valid- |
Enables or disables detection of ad hoc networks using valid or protected SSIDs. |
detect-bad-wep |
Enables or disables detection of WEP initialization vectors that are known to be weak or repeating. A primary means of cracking WEP keys is to capture 802.11 frames over an extended period of time and search for implementations that are still used by many legacy devices. |
detect-ht-greenfield |
Enables or disables detection of high-throughput devices advertising greenfield preamble capability. |
detect-invalid-mac-oui |
Enables or disables checking of the first three bytes of a MAC address, known as the organizationally unique identifier (OUI), assigned by the IEEE to known manufacturers. Often clients using a spoofed MAC address do not use a valid OUI and instead use a randomly generated MAC address. Enabling MAC OUI checking causes an alarm to be triggered if an unrecognized MAC address is in use. |
detect-misconfigured-ap |
Enables or disables detection of misconfigured APs. An AP is classified as misconfigured if it is classified as valid and does not meet any of the following configurable parameters:
|
detect-sta-assoc-to-rogue |
Enables or disables detection of station association to rogue AP. |
检测到未结晶的valid- |
Enables or disables detection of unencrypted valid clients. |
detect-valid-client- misassociation |
Enables or disables detection of misassociation between a valid client and an unsafe AP. This setting can detect the following misassociation types:
|
detect-valid-ssid-misuse |
Enables or disables detection of Interfering or Neighbor APs using valid or protected SSIDs. |
detect-windows-bridge |
Enables or disables detection of Windows station bridging. |
detect-wireless-bridge |
Enables or disables detection of wireless bridging. |
检测无线托管 - 网络 |
If enabled, this feature can detect the presence of a wireless hosted network. When a wireless hosted network is detected this feature sends a “Wireless Hosted Network” warning level security log message and thewlsxWirelessHostedNetworkDetectedSNMP陷阱。 If there are clients associated to the hosted network, this feature will send a “Client Associated To Hosted Network” warning level security log message and thewlsxClientAssociatedToHostedNetworkDetectedSNMP陷阱。 |
mac-oui-quiet-time |
Time, in seconds, that must elapse after an invalid MAC OUI alarm has been triggered before another identical alarm may be triggered. 60-360000 seconds 900 seconds |
不 |
否定任何配置的参数。 |
OUI分类 |
Enables or disables OUI based rogue AP classification. |
overlay-classification |
Enables or disables overlay rogue AP classification. |
privacy |
Enables or disables encryption as a valid AP configuration. |
Prop-WM分类 |
Enables or disables rogue AP classification through propagated wired MACs. |
保护赞美剂 |
Enable or disable advanced protection from open or WEP ad hoc networks. When enhanced ad hoc containment is carried out, a new repeatable event, syslog and SNMP trap will be generated for each containment event. |
保护添加剂网络 |
使用WPA或WPA2安全性启用或禁用免受临时网络的保护。当检测到临时网络时,使用DOS攻击禁用它们。 |
保护阿多克 - valid-ssid |
Enable or disable protection from ad hoc networks using valid or protected SSIDs. |
protect-high-throughput |
Enable or disable protection of high-throughput (802.11n) devices. |
Protect-HT-40MHz |
Enable or disable protection of high-throughput (802.11n) devices operating in 40 MHz mode. |
保护合并的AP |
Enable or disable protection of misconfigured APs. |
protect-ssid |
Enable or disable use of SSID by valid APs only. |
protect-valid-sta |
When enabled, does not allow valid stations to connect to a non-valid AP. |
保护Windows-Bridge |
Enable or disable protection of a windows station bridging |
protect-wireless-hosted- 网络 |
When you enable the wireless hosted network protection feature,移动导体enforces containment on a wireless hosted network by launching a denial of service attack to disrupt associations between a Windows 7 software-enabled Access Point (softAP) and a client, and disrupt associations between the client that is hosting the softAP and any access point to which the host connects. When a wireless hosted network triggers this feature, wireless hosted network protection sends the Wireless Hosted Network Containment and The existing generic containment SNMP traps and log messages will also be sent when Wireless Hosted Network Containment or Host of Wireless Network Containment is enforced. |
需要WPA |
When enabled, any valid AP that is not using WPA encryption is flagged as misconfigured. |
rogue-containment |
Rogue APs can be detected (see classification) but are not automatically disabled. This option automatically shuts down rogue APs. When this option is enabled, clients attempting to associate to an AP classified as a rogue are disconnected through a denial of service attack. |
可疑流-CONF级 |
Confidence level of suspected Rogue AP to trigger containment. When an AP is classified as a suspected rogue AP, it is assigned a 50% confidence level. If multiple APs trigger the same events that classify the AP as a suspected rogue, the confidence level increases by 5% up to 95%. 结合怀疑的流氓遏制,此选项配置应遏制的阈值。仅当达到配置的置信度水平时,可疑的流氓遏制才会发生。 50-100% 60% |
suspect-rogue-containment |
怀疑的流氓AP被视为干扰AP,从而移动导体attempts to reclassify them as rogue APs. Suspected rogue APs are not automatically contained. In combination with the configured confidence level (see suspect-rogue-conf-level), this option contains the suspected rogue APs. |
unencrypted-valid-client-quiet-time |
Time to wait, in seconds, after detecting an unencrypted valid client after which the check can be resumed. 60-360000 seconds 900 seconds |
valid-and-protected-ssid |
List of valid and protected SSIDs. |
valid-oui |
有效的Mac OUIS列表。 |
valid-wired-mac |
List of MAC addresses of wired devices in the network, typically gateways or servers. |
wireless-bridge-quiet-time |
Time, in seconds, that must elapse after a wireless bridge alarm has been triggered before another identical alarm may be triggered. 60-360000 seconds 900 seconds |
无线托管网络Quiet时间 <无线托管网络Quiet-time> |
当检测到无线托管网络时,无线托管网络检测功能将发送日志消息和陷阱。该参数定义的安静时间设置了在无线托管网络日志消息或陷阱之后触发之后必须大量的时间,然后才能再次发送相同的日志或陷阱。 60-360000 seconds 900 seconds |
Example
下面的通讯和copies the settings from the ids-unauthorized-device-disabled profile and then enables detection and protection from ad hoc networks:
(host) [mynode] (config) #ids unauthorized-device-profile floor7
(主机)[myNode](IDS未经授权的设备配置文件“ Floor7”)#unuth1
(主机)[mynode] (IDS未经授权的设备概要文件”floor7") #clone ids-unauthorized-device-disable
(主机)[mynode] (IDS未经授权的设备概要文件”floor7") #detect-adhoc-network
(主机)[mynode] (IDS未经授权的设备概要文件”floor7") #protect-adhoc-network
Related Commands
Command |
Description |
显示IDS未经授权的设备配置文件。 |
命令历史记录
发布 |
Modification |
ArubaOS8.0.0.0 |
Command introduced. |
Command Information
Platform |
License |
Command Mode |
All platforms |
需要RFprotect许可证。 |
Config mode on移动导体. |