ids unauthorized-device-profile

ids unauthorized-device-profile <profile-name>

adhoc-using-valid-ssid-quiet-time <adhoc-using-valid-ssid-quiet-time>

allow-well-known-mac [hsrp|iana|local-mac|vmware|vmware1|vmware2|vmware3]

cfg-valid-11a-channel <channel>

cfg-valid-11g-channel <channel>

classification

clone <source>

detect-adhoc-network

detect-adhoc-using-valid-ssid

detect-bad-wep

detect-ht-greenfield

detect-invalid-mac-oui

detect-misconfigured-ap

detect-sta-assoc-to-rogue

detect-unencrypted-valid-client

detect-valid-client-misassociation

detect-valid-ssid-misuse

detect-wifi-direct-p2p-groups

detect-windows-bridge

detect-wireless-bridge

detect-wireless-hosted-network

ignore-adhoc-awdl-networks

mac-oui-quiet-time <mac-oui-quiet-time>

no

oui-classification

overlay-classification

privacy

prop-wm-classification

protect-adhoc-enhanced

protect-adhoc-network

protect-adhoc-using-valid-ssid

protect-high-throughput

protect-ht-40mhz

protect-misconfigured-ap

protect-ssid

protect-valid-sta x

protect-wifi-direct-p2p-groups

protect-windows-bridge

protect-wireless-hosted-network

require-wpa

rogue-containment

suspect-rogue-conf-level <suspect-rogue-conf-level>

suspect-rogue-containment

unencrypted-valid-client-quiet-time

valid-and-protected-ssid <valid-and-protected-ssid>

valid-oui <valid-oui>

valid-wired-mac <valid-wired-mac>

vendor-specific-ie-exclusion <oui> <oui type>

wifi-direct-network-quiet-time

wireless-bridge-quiet-time <wireless-bridge-quiet-time>

wireless-hosted-network-quiet-time <wireless-hosted-network-quiet-time>

Description

This command configures detection of unauthorized devices, as well as rogue AP detection and containment. Unauthorized device detection includes the ability to detect and disable rogue APs and other devices that can potentially disrupt network operations.

Parameter

Description

<profile-name>

Name that identifies an instance of the profile.

Range: 1-63 characters

Default:  

adhoc-using-valid-ssid-

quiet-time

Time to wait, in seconds, after detecting an ad hoc network using a valid SSID, after which the check can be resumed.

Range: 60-360000 seconds

Default: 900 seconds

allow-well-known-mac

Allows devices with known MAC addresses to classify rogues APs.

Depending on your network, configure one or more of the following options for classifying rogue APs:

  • hsrp: Routers configured for HSRP, a Cisco-proprietary redundancy protocol, with the HSRP MAC OUI 00:00:0c.
  • iana: Routers using the IANA MAC OUI 00:00:5e.
  • local-mac: Devices with locally administered MAC addresses starting with 02.
  • vmware: Devices with any of the following VMWare OUIs: 00:0c:29, 00:05:69, or 00:50:56
  • vmware1: Devices with VMWare OUI 00:0c:29.
  • vmware2: Devices with VMWare OUI 00:05:69.
  • vmware3: Devices with VMWare OUI 00:50:56.

If you modify an existing configuration, the new configuration overrides the original configuration. For example, if you configure allow-well-known-mac hsrpand then configure allow-well-known-mac iana, the original configuration is lost. To add more options to the original configuration, include all of the required options, for example: allow-well-known-mac hsrp iana.

Use caution when configuring this command. If the neighboring network uses similar routers, those APs might be classified as rogues. If containment is enabled, clients attempting to associate to an AP classified as a rogue are disconnected through a denial of service attack.

To clear the well known MACs in the system, use the following commands:

  • clear wms wired-mac:This clears all of the learned wired MAC information on Mobility Conductor.
  • reload: This reboots Mobility Conductor.

cfg-valid-11a-channel <channel>

List of valid 802.11a channels that third-party APs are allowed to use.

Range: 34-165

cfg-valid-11g-channel <channel>

List of valid 802.11b/g channels that third-party APs are allowed to use.

Range: 1-14

classification

Enables or disables rogue AP classification. A rogue AP is one that is unauthorized and plugged into the wired side of the network. Any other AP seen in the RF environment that is not part of the valid enterprise network is considered to be interfering — it has the potential to cause RF interference but it is not connected to the wired network and thus does not represent a direct threat.

clone <source>

Name of an existing IDS rate thresholds profile from which parameter values are copied.

detect-adhoc-network

Enables or disables detection of ad hoc networks.

detect-adhoc-using-valid-
ssid

Enables or disables detection of ad hoc networks using valid or protected SSIDs.

detect-bad-wep

Enables or disables detection of WEP initialization vectors that are known to be weak or repeating. A primary means of cracking WEP keys is to capture 802.11 frames over an extended period of time and search for implementations that are still used by many legacy devices.

detect-ht-greenfield

Enables or disables detection of high-throughput devices advertising greenfield preamble capability.

detect-invalid-mac-oui

Enables or disables checking of the first three bytes of a MAC address, known as the organizationally unique identifier (OUI), assigned by the IEEE to known manufacturers. Often clients using a spoofed MAC address do not use a valid OUI and instead use a randomly generated MAC address. Enabling MAC OUI checking causes an alarm to be triggered if an unrecognized MAC address is in use.

detect-misconfigured-ap

Enables or disables detection of misconfigured APs. An AP is classified as misconfigured if it is classified as valid and does not meet any of the following configurable parameters:

  • valid channels
  • encryption type
  • list of valid AP MAC OUIs
  • valid SSID list

detect-sta-assoc-to-rogue

Enables or disables detection of station association to rogue AP.

detect-unencrypted-valid-
client

Enables or disables detection of unencrypted valid clients.

detect-valid-client- misassociation

Enables or disables detection of misassociation between a valid client and an unsafe AP. This setting can detect the following misassociation types:

  • MisassociationToRogueAP
  • MisassociationToExternalAP
  • MisassociationToHoneypotAP
  • MisassociationToAdhocAP
  • MisassociationToHostedAP

detect-valid-ssid-misuse

Enables or disables detection of Interfering or Neighbor APs using valid or protected SSIDs.

detect-wifi-direct-p2p-groups

Enables or disables detection of WIFI-Direct P2P groups.

detect-windows-bridge

Enables or disables detection of Windows station bridging.

detect-wireless-bridge

Enables or disables detection of wireless bridging.

detect-wireless-hosted-

network

If enabled, this feature can detect the presence of a wireless hosted network.

When a wireless hosted network is detected this feature sends a “Wireless Hosted Network” warning level security log message and the wlsxWirelessHostedNetworkDetected SNMP trap.

If there are clients associated to the hosted network, this feature will send a “Client Associated To Hosted Network” warning level security log message and the wlsxClientAssociatedToHostedNetworkDetected SNMP trap.

ignore-adhoc-awdl-networks

Ignore or process frames from adhoc AWDL networks.

mac-oui-quiet-time

Time, in seconds, that must elapse after an invalid MAC OUI alarm has been triggered before another identical alarm may be triggered.

Range: 60-360000 seconds

Default: 900 seconds

no

Negates any configured parameter.

oui-classification

Enables or disables OUI based rogue AP classification.

overlay-classification

Enables or disables overlay rogue AP classification.

privacy

Enables or disables encryption as a valid AP configuration.

prop-wm-classification

Enables or disables rogue AP classification through propagated wired MACs.

protect-adhoc-enhanced

Enable or disable advanced protection from open or WEP ad hoc networks. When enhanced ad hoc containment is carried out, a new repeatable event, syslog and SNMP trap will be generated for each containment event.

protect-adhoc-network

Enable or disable protection from ad hoc networks using WPA or WPA2 security. When ad hoc networks are detected, they are disabled using a DoS attack.

protect-adhoc-using-

valid-ssid

Enable or disable protection from ad hoc networks using valid or protected SSIDs.

protect-high-throughput

Enable or disable protection of high-throughput (802.11n) devices.

protect-ht-40mhz

Enable or disable protection of high-throughput (802.11n) devices operating in 40 MHz mode.

protect-misconfigured-ap

Enable or disable protection of misconfigured APs.

protect-ssid

Enable or disable use of SSID by valid APs only.

protect-valid-sta

When enabled, does not allow valid stations to connect to a non-valid AP.

protect-wifi-direct-p2pgroups

Enable or disable protection from WIFI-Direct P2P Groups.

protect-windows-bridge

Enable or disable protection of a windows station bridging

protect-wireless-hosted-

network

When you enable the wireless hosted network protection feature, Mobility Conductor enforces containment on a wireless hosted network by launching a denial of service attack to disrupt associations between a Windows 7 software-enabled Access Point (softAP) and a client, and disrupt associations between the client that is hosting the softAP and any access point to which the host connects.

When a wireless hosted network triggers this feature, wireless hosted network protection sends the Wireless Hosted Network Containment and
Host of Wireless Network Containment warning level security log messages, and the wlsxWirelessHostedNetworkContainment and wlsxHostOfWirelessNetworkContainment SNMP traps.

NOTE: The existing generic containment SNMP traps and log messages will also be sent when Wireless Hosted Network Containment or Host of Wireless Network Containment is enforced.

require-wpa

When enabled, any valid AP that is not using WPA encryption is flagged as misconfigured.

rogue-containment

Rogue APs can be detected (see classification) but are not automatically disabled. This option automatically shuts down rogue APs. When this option is enabled, clients attempting to associate to an AP classified as a rogue are disconnected through a denial of service attack.

suspect-rogue-conf-level

<suspect-rogue-conf-level>

Confidence level of suspected Rogue AP to trigger containment.

When an AP is classified as a suspected rogue AP, it is assigned a 50% confidence level. If multiple APs trigger the same events that classify the AP as a suspected rogue, the confidence level increases by 5% up to 95%.

In combination with suspected rogue containment, this option configures the threshold by which containment should occur. Suspected rogue containment occurs only when the configured confidence level is met.

Range: 50-100%

Default: 60%

suspect-rogue-containment

Suspected rogue APs are treated as interfering APs, thereby Mobility Conductor attempts to reclassify them as rogue APs. Suspected rogue APs are not automatically contained. In combination with the configured confidence level (see suspect-rogue-conf-level), this option contains the suspected rogue APs.

unencrypted-valid-client-quiet-time

<unencrypted-valid-client-quiet-time>

Time to wait, in seconds, after detecting an unencrypted valid client after which the check can be resumed.

Range: 60-360000 seconds

Default: 900 seconds

valid-and-protected-ssid <ssid>

List of valid and protected SSIDs.

valid-oui <valid-oui>

List of valid MAC OUIs.

valid-wired-mac

<valid-wired-mac>

List of MAC addresses of wired devices in the network, typically gateways or servers.

vendor-specific-ie-exclusion <oui> <oui type>

Configures exclusions for IDS containment based on vendor specific IE information. This feature allows APs to be exempted from containment even when the devices use randomized MAC addresses. AOS allows for a maximum of five vendor OUI and OUI types to be defined for confinement exclusion.

wifi-direct-network-quiet-time

Time to wait in seconds after detecting a WIFI-Direct network, after which the check can be resumed. Minimum is 60 seconds

wireless-bridge-quiet-time

<wireless-bridge-quiet-time>

Time, in seconds, that must elapse after a wireless bridge alarm has been triggered before another identical alarm may be triggered.

Range: 60-360000 seconds

Default: 900 seconds

wireless-hosted-network-quiet-time

<wireless-hosted-network-quiet-time>


The wireless hosted network detection feature sends a log message and trap when a wireless hosted network is detected. The quiet time defined by this parameter sets the amount of time, in seconds, that must elapse after a wireless hosted network log message or trap has been triggered before an identical log message or trap can be sent again.

Range: 60-360000 seconds

Default: 900 seconds

Example

The following command copies the settings from the ids-unauthorized-device-disabled profile and then enables detection and protection from ad hoc networks:

(host) [mynode] (config) #ids unauthorized-device-profile floor7

(host) [mynode] (IDS Unauthorized Device Profile "floor7") #unauth1

(host) [mynode] (IDS Unauthorized Device Profile "floor7") #clone ids-unauthorized-device-disable

(host) [mynode] (IDS Unauthorized Device Profile "floor7") #detect-adhoc-network

(host) [mynode] (IDS Unauthorized Device Profile "floor7") #protect-adhoc-network

Related Commands

Command

Description

show ids unauthorized-device-profile

Displays an IDS unauthorized device profile.

Command History

Release

Modification

AOS 8.11.0.0

The vendor-specific-ie-exclusion parameter was introduced.

AOS 8.0.0.0

Command introduced.

Command Information

Platform

License

Command Mode

All platforms

Requires the RFprotect license.

Config mode on Mobility Conductor.