Reference Guide

Table Of Contents
223 | ids impersonation-profile Dell PowerConnect ArubaOS 6.0 Command Line Interface | Reference Guide
Syntax
Usage Guidelines
A successful man-in-the-middle attack will insert an attacker into the data path between the client and the AP. In
such a position, the attacker can delete, add, or modify data, provided he has access to the encryption keys. Such
an attack also enables other attacks that can learn a client’s authentication credentials. Man-in-the-middle
attacks often rely on a number of different vulnerabilities.
Example
The following command enables detections in the impersonation profile:
(host) (config) #ids impersonation-profile floor1
(host) (IDS Impersonation Profile "floor1") #detect-beacon-wrong-channel
(host) (IDS Impersonation Profile "floor1") #detect-ap-impersonation
Parameter Description Range Default
<profile> Name that identifies an instance of the profile. The
name must be 1-63 characters.
default”
beacon-diff-threshold Percentage increase in beacon rates that triggers
an AP impersonation event.
0-100 50%
beacon-inc-wait-time Time, in seconds, after the beacon difference
threshold is crossed before an AP impersonation
event is generated.
3 seconds
beacon-wrong-channel-quiet-time Time to wait, in seconds, after detecting a beacon
with the wrong channel after which the check can
be resumed.
60-360000
seconds
900
seconds
clone Name of an existing IDS impersonation profile
from which parameter values are copied.
——
detect-ap-impersonation Enables detection of AP impersonation. In AP
impersonation attacks, the attacker sets up an AP
that assumes the BSSID and ESSID of a valid AP.
AP impersonation attacks can be done for man-in-
the-middle attacks, a rogue AP attempting to
bypass detection, or a honeypot attack.
—true
detect-ap-spoofing Enable/disable AP Spoofing detection enable
detect-beacon-wrong-channel Enable/disable detection of beacons advertising
the incorrect channel
disable
detect-hotspotter Enable/disable detection of the Hotspotter attack
to lure away valid clients.
disable
hotspotter-quiet-time Time to wait in seconds after detecting an attempt
to Use the Hotspotter tool against clients.
60-360000
seconds
900
seconds
no Negates any configured parameter.
protect-ap-impersonation When AP impersonation is detected, both the
legitimate and impersonating AP are disabled
using a denial of service attack.
—false