Concept Guide
ids profile
ids profile <name>
clone <profile>
dos-profile <profile>
general-profile <profile>
impersonation-profile <profile>
no ...
signature-matching-profile <profile>
unauthorized-device-profile <profile>
Description
This command defines a set of IDS profiles.
Syntax
Parameter Description Default
<profile>
Name that identifies an instance of the profile. The
name must be 1-63 characters.
“default”
clone
Name of an existing IDS profile from which
parameter values are copied.
—
dos-profile
Name of a IDS denial of service profile to be applied
to the AP group/name. See ids dos-profile on page
405.
“default”
general-profile
Name of an IDS general profile to be applied to the
AP group/name. See ids general-profile on page
414.
“default”
impersonation-profile
Name of an IDS impersonation profile to be applied
to the AP group/name. See ids impersonation-
profile on page 420.
“default”
no
Negates any configured parameter. —
signature-matching-profile
Name of an IDS signature matching profile to be
applied to the AP group/name. See ids signature-
matching-profile on page 428
“default”
unauthorized-device-profile
Name of an IDS unauthorized device profile to be
applied to the AP group/name. See ids
unauthorized-device-profile on page 433.
“default”
Usage Guidelines
This command defines a set of IDS profiles that you can then apply to an AP group (with the ap-group
command) or to a specific AP (with the ap-name command).
Dell Networking W-Series ArubaOS 6.5.x | Reference Guide ids profile | 424