ids unauthorized-device-profile

ids unauthorized-device-profile

Adhoc-using-ssid-Quiet-Quiet-Quiet-Quiet

allow-well-known-mac [hsrp|iana|local-mac|vmware|vmware1|vmware2|vmware3]

CFG-VALID-11A-CHANNEL

cfg-valid-11g-channel

classification

clone

检测 - 阿德霍克网络

detect-adhoc-using-valid-ssid

detect-bad-wep

detect-ht-greenfield

detect-invalid-mac-oui

detect-misconfigured-ap

detect-sta-assoc-to-rogue

检测到未结晶的valid-client

detect-valid-client-misassociation

detect-valid-ssid-misuse

detect-windows-bridge

detect-wireless-bridge

检测无线托管 -网络

mac-oui-quiet-time

OUI分类

overlay-classification

privacy

Prop-WM分类

保护赞美剂

保护添加剂网络

保护阿多克 -valid-ssid

protect-high-throughput

Protect-HT-40MHz

保护合并的AP

protect-ssid

protect-valid-sta x

保护Windows-Bridge

protect-wireless-hosted-network

需要WPA

rogue-containment

可疑流-CONF级

suspect-rogue-containment

unencrypted-valid-client-quiet-time

valid-and-protected-ssid

valid-oui

有效连接的-MAC <有效连接-MAC>

无线桥 - 超时<无线桥 - 奎特时间>

无线托管网络Quiet时间<无线托管网络Quiet-time>

Description

This command configures detection of unauthorized devices, as well as rogue AP detection and containment. Unauthorized device detection includes the ability to detect and disable rogue APs and other devices that can potentially disrupt network operations.

Parameter

Description

Name that identifies an instance of the profile.

范围:1-63 characters

Default:

adhoc-using-valid-ssid-

quiet-time

在使用有效的SSID检测到临时网络之后,可以在几秒钟内等待,然后可以恢复检查。

范围:60-360000 seconds

Default:900 seconds

allow-well-known-mac

允许具有已知MAC地址的设备来对Rogues AP进行分类。

Depending on your network, configure one or more of the following options for classifying rogue APs:

  • hsrp: Routers configured for HSRP, a Cisco-proprietary redundancy protocol, with the HSRP MAC OUI 00:00:0c.
  • iana:使用IANA MAC OUI 00:00:5E的路由器。
  • 本地-MAC: Devices with locally administered MAC addresses starting with 02.
  • vmware:带有以下任何VMware OUIS的设备:00:0C:29,00:05:69或00:50:56
  • vmware1: Devices with VMWare OUI 00:0c:29.
  • vmware2:带VMware OUI 00:05:69的设备。
  • vmware3:带VMware OUI 00:50:56的设备。

If you modify an existing configuration, the new configuration overrides the original configuration. For example, if you configure允许孔已知的MAC HSRP和then configure允许井知道的麦克iana, the original configuration is lost. To add more options to the original configuration, include all of the required options, for example:允许孔已知的MAC HSRPiana.

Use caution when configuring this command. If the neighboring network uses similar routers, those APs might be classified as rogues. If containment is enabled, clients attempting to associate to an AP classified as a rogue are disconnected through a denial of service attack.

To clear the well known MACs in the system, use the following commands:

  • clear wms wired-mac:This clears all of the learned wired MAC information on移动导体.
  • 重新加载:重新启动移动导体.

CFG-VALID-11A-CHANNEL

List of valid 802.11a channels that third-party APs are allowed to use.

范围:34-165

cfg-valid-11g-channel

List of valid 802.11b/g channels that third-party APs are allowed to use.

范围:1-14

classification

Enables or disables rogue AP classification. A rogue AP is one that is unauthorized and plugged into the wired side of the network. Any other AP seen in the RF environment that is not part of the valid enterprise network is considered to be interfering — it has the potential to cause RF interference but it is not connected to the wired network and thus does not represent a direct threat.

clone

现有IDS速率阈值的名称复制参数值的名称。

检测 - 阿德霍克网络

Enables or disables detection of ad hoc networks.

detect-adhoc-using-valid-
ssid

Enables or disables detection of ad hoc networks using valid or protected SSIDs.

detect-bad-wep

Enables or disables detection of WEP initialization vectors that are known to be weak or repeating. A primary means of cracking WEP keys is to capture 802.11 frames over an extended period of time and search for implementations that are still used by many legacy devices.

detect-ht-greenfield

Enables or disables detection of high-throughput devices advertising greenfield preamble capability.

detect-invalid-mac-oui

Enables or disables checking of the first three bytes of a MAC address, known as the organizationally unique identifier (OUI), assigned by the IEEE to known manufacturers. Often clients using a spoofed MAC address do not use a valid OUI and instead use a randomly generated MAC address. Enabling MAC OUI checking causes an alarm to be triggered if an unrecognized MAC address is in use.

detect-misconfigured-ap

Enables or disables detection of misconfigured APs. An AP is classified as misconfigured if it is classified as valid and does not meet any of the following configurable parameters:

  • valid channels
  • encryption type
  • list of valid AP MAC OUIs
  • valid SSID list

detect-sta-assoc-to-rogue

Enables or disables detection of station association to rogue AP.

检测到未结晶的valid-
client

Enables or disables detection of unencrypted valid clients.

detect-valid-client- misassociation

Enables or disables detection of misassociation between a valid client and an unsafe AP. This setting can detect the following misassociation types:

  • MisassociationToRogueAP
  • MisassociationToExternalAP
  • 误导hohoneypotap
  • MisassociationToAdhocAP
  • 错误关联对托管

detect-valid-ssid-misuse

Enables or disables detection of Interfering or Neighbor APs using valid or protected SSIDs.

detect-windows-bridge

Enables or disables detection of Windows station bridging.

detect-wireless-bridge

Enables or disables detection of wireless bridging.

检测无线托管 -

网络

If enabled, this feature can detect the presence of a wireless hosted network.

When a wireless hosted network is detected this feature sends a “Wireless Hosted Network” warning level security log message and thewlsxWirelessHostedNetworkDetectedSNMP陷阱。

If there are clients associated to the hosted network, this feature will send a “Client Associated To Hosted Network” warning level security log message and thewlsxClientAssociatedToHostedNetworkDetectedSNMP陷阱。

mac-oui-quiet-time

Time, in seconds, that must elapse after an invalid MAC OUI alarm has been triggered before another identical alarm may be triggered.

范围:60-360000 seconds

Default:900 seconds

否定任何配置的参数。

OUI分类

Enables or disables OUI based rogue AP classification.

overlay-classification

Enables or disables overlay rogue AP classification.

privacy

Enables or disables encryption as a valid AP configuration.

Prop-WM分类

Enables or disables rogue AP classification through propagated wired MACs.

保护赞美剂

Enable or disable advanced protection from open or WEP ad hoc networks. When enhanced ad hoc containment is carried out, a new repeatable event, syslog and SNMP trap will be generated for each containment event.

保护添加剂网络

使用WPA或WPA2安全性启用或禁用免受临时网络的保护。当检测到临时网络时,使用DOS攻击禁用它们。

保护阿多克 -

valid-ssid

Enable or disable protection from ad hoc networks using valid or protected SSIDs.

protect-high-throughput

Enable or disable protection of high-throughput (802.11n) devices.

Protect-HT-40MHz

Enable or disable protection of high-throughput (802.11n) devices operating in 40 MHz mode.

保护合并的AP

Enable or disable protection of misconfigured APs.

protect-ssid

Enable or disable use of SSID by valid APs only.

protect-valid-sta

When enabled, does not allow valid stations to connect to a non-valid AP.

保护Windows-Bridge

Enable or disable protection of a windows station bridging

protect-wireless-hosted-

网络

When you enable the wireless hosted network protection feature,移动导体enforces containment on a wireless hosted network by launching a denial of service attack to disrupt associations between a Windows 7 software-enabled Access Point (softAP) and a client, and disrupt associations between the client that is hosting the softAP and any access point to which the host connects.

When a wireless hosted network triggers this feature, wireless hosted network protection sends the Wireless Hosted Network Containment and
Host of Wireless Network Containment warning level security log messages, and thewlsxWirelessHostedNetworkContainmentwlsxHostOfWirelessNetworkContainmentSNMP陷阱。

NOTE:The existing generic containment SNMP traps and log messages will also be sent when Wireless Hosted Network Containment or Host of Wireless Network Containment is enforced.

需要WPA

When enabled, any valid AP that is not using WPA encryption is flagged as misconfigured.

rogue-containment

Rogue APs can be detected (see classification) but are not automatically disabled. This option automatically shuts down rogue APs. When this option is enabled, clients attempting to associate to an AP classified as a rogue are disconnected through a denial of service attack.

可疑流-CONF级

Confidence level of suspected Rogue AP to trigger containment.

When an AP is classified as a suspected rogue AP, it is assigned a 50% confidence level. If multiple APs trigger the same events that classify the AP as a suspected rogue, the confidence level increases by 5% up to 95%.

结合怀疑的流氓遏制,此选项配置应遏制的阈值。仅当达到配置的置信度水平时,可疑的流氓遏制才会发生。

范围:50-100%

Default:60%

suspect-rogue-containment

怀疑的流氓AP被视为干扰AP,从而移动导体attempts to reclassify them as rogue APs. Suspected rogue APs are not automatically contained. In combination with the configured confidence level (see suspect-rogue-conf-level), this option contains the suspected rogue APs.

unencrypted-valid-client-quiet-time

Time to wait, in seconds, after detecting an unencrypted valid client after which the check can be resumed.

范围:60-360000 seconds

Default:900 seconds

valid-and-protected-ssid

List of valid and protected SSIDs.

valid-oui

有效的Mac OUIS列表。

valid-wired-mac

List of MAC addresses of wired devices in the network, typically gateways or servers.

wireless-bridge-quiet-time

Time, in seconds, that must elapse after a wireless bridge alarm has been triggered before another identical alarm may be triggered.

范围:60-360000 seconds

Default:900 seconds

无线托管网络Quiet时间

<无线托管网络Quiet-time>


当检测到无线托管网络时,无线托管网络检测功能将发送日志消息和陷阱。该参数定义的安静时间设置了在无线托管网络日志消息或陷阱之后触发之后必须大量的时间,然后才能再次发送相同的日志或陷阱。

范围:60-360000 seconds

Default:900 seconds

Example

下面的通讯和copies the settings from the ids-unauthorized-device-disabled profile and then enables detection and protection from ad hoc networks:

(host) [mynode] (config) #ids unauthorized-device-profile floor7

(主机)[myNode](IDS未经授权的设备配置文件“ Floor7”)#unuth1

(主机)[mynode] (IDS未经授权的设备概要文件”floor7") #clone ids-unauthorized-device-disable

(主机)[mynode] (IDS未经授权的设备概要文件”floor7") #detect-adhoc-network

(主机)[mynode] (IDS未经授权的设备概要文件”floor7") #protect-adhoc-network

Related Commands

Command

Description

show ids unauthorized-device-profile

显示IDS未经授权的设备配置文件。

命令历史记录

发布

Modification

ArubaOS8.0.0.0

Command introduced.

Command Information

Platform

License

Command Mode

All platforms

需要RFprotect许可证。

Config mode on移动导体.