Concept Guide

434| ids unauthorized-device-profile Dell Networking W-Series ArubaOS 6.5.x| Reference Guide
Syntax
Parameter Description Range
Defaul
t
<profile>
Name that identifies an instance of the
profile. The name must be 1-63
characters.
“defaul
t”
adhoc-using-valid-ssid-quiet-
time
Time to wait, in seconds, after detecting
an adhoc network using a valid SSID,
after which the check can be resumed.
60-
36000
0
900
secon
ds
allow-well-known-mac
Allows devices with known MAC
addresses to classify rogues APs.
Depending on your network, configure
one or more of the following options for
classifying rogue APs:
l hsrp—Routers configured for HSRP, a
Cisco-proprietary redundancy
protocol, with the HSRP MAC OUI
00:00:0c.
l iana—Routers using the IANA MAC
OUI 00:00:5e.
l local-mac—Devices with locally
administered MAC addresses starting
with 02.
l vmware—Devices with any of the
following VMWare OUIs: 00:0c:29,
00:05:69, or 00:50:56
l vmware1—Devices with VMWare OUI
00:0c:29.
l vmware2—Devices with VMWare OUI
00:05:69.
l vmware3—Devices with VMWare OUI
00:50:56.
If you modify an existing configuration,
the new configuration overrides the
original configuration. For example, if you
configure allow-well-known-mac hsrp
and then configure allow-well-known-
mac iana, the original configuration is
lost. To add more options to the original
configuration, include all of the required
options, for example: allow-well-
known-mac hsrp iana.
Use caution when configuring this
command. If the neighboring network
uses similar routers, those APs might be
classified as rogues. If containment is
enabled, clients attempting to associate
to an AP classified as a rogue are
disconnected through a denial of service
attack.