Syntax
Parameter
Description
Range
Default
<profile>
Name that identifies an instance of the profile. The
name must be 1-63 characters.
—
“default”
adhoc-using-valid-ssid-quiet-
time
Time to wait, in seconds, after detecting an adhoc
network using a valid SSID, after which the check
can be resumed.
60-
360000
900
seconds
allow-well-known-mac
Allows devices with known MAC addresses to
classify rogues APs.
Depending on your network, configure one or more
of the following options for classifying rogue APs:
l
hsrp—Routers configured for HSRP, a Cisco-
proprietary redundancy protocol, with the HSRP
MAC OUI 00:00:0c.
l
iana—Routers using the IANA MAC OUI
00:00:5e.
l
local-mac—Devices with locally administered
MAC addresses starting with 02.
l
vmware—Devices with any of the following
VMWare OUIs: 00:0c:29, 00:05:69, or 00:50:56
l
vmware1—Devices with VMWare OUI 00:0c:29.
l
vmware2—Devices with VMWare OUI 00:05:69.
l
vmware3—Devices with VMWare OUI 00:50:56.
If you modify an existing configuration, the new
configuration overrides the original configuration.
For example, if you configure
allow-well-
known-mac hsrp
and then configure
allow-
well-known-mac iana
, the original
configuration is lost. To add more options to the
original configuration, include all of the required
options, for example:
allow-well-known-mac
hsrp iana
.
Use caution when configuring this command. If the
neighboring network uses similar routers, those
APs might be classified as rogues. If containment is
enabled, clients attempting to associate to an AP
classified as a rogue are disconnected through a
denial of service attack.
To clear the well known MACs in the system, use
the following commands:
l
clear wms wired-mac
:This clears all of
the learned wired MAC information on the
controller.
l
reload:
This reboots the controller.
—
—
cfg-valid-11a-channel
List of valid 802.11a channels that third-party APs
are allowed to use.
34-165
N/A
cfg-valid-11g-channel
List of valid 802.11b/g channels that third-party APs
are allowed to use.
1-14
N/A
classification
Enable/disable rogue AP classification. A rogue AP
is one that is unauthorized and plugged into the
—
true
Dell PowerConnect W-Series ArubaOS 6.2 |
Reference Guide
ids unauthorized-device-profile | 305
Содержание PowerConnect W-7200 Series
Страница 1: ...Dell PowerConnect W Series ArubaOS 6 2 Command Line Interface Reference Guide ...
Страница 38: ...38 aaa authentication server windows DellPowerConnect W Series ArubaOS 6 2 Reference Guide ...
Страница 319: ...DellPowerConnect W Series ArubaOS 6 2 Reference Guide interface loopback 319 ...
Страница 346: ...346 ipv6 mld DellPowerConnect W Series ArubaOS 6 2 Reference Guide ...
Страница 387: ...DellPowerConnect W Series ArubaOS 6 2 Reference Guide ip radius 387 ...
Страница 995: ...DellPowerConnect W Series ArubaOS 6 2 Reference Guide show firewall 995 ...
Страница 1070: ...1070 show ip dhcp DellPowerConnect W Series ArubaOS 6 2 Reference Guide Command History Introduced in ArubaOS 3 0 ...
Страница 1529: ...DellPowerConnect W Series ArubaOS 6 2 Reference Guide wms client 1529 ...
Страница 1536: ...0510956 01 March 2013 1536 ...