ids unauthorized-device-profile
ids unauthorized-device-profile <profile-name>
adhoc-using-valid-ssid-quiet-time <adhoc-using-valid-ssid-quiet-time>
allow-well-known-mac [hsrp|iana|local-mac|vmware|vmware1|vmware2|vmware3]
cfg-valid-11a-channel <channel>
cfg-valid-11g-channel <channel>
classification
clone <source>
detect-adhoc-network
detect-adhoc-using-valid-ssid
detect-bad-wep
detect-ht-greenfield
detect-invalid-mac-oui
detect-misconfigured-ap
detect-sta-assoc-to-rogue
detect-unencrypted-valid-client
detect-valid-client-misassociation
detect-valid-ssid-misuse
detect-wifi-direct-p2p-groups
detect-windows-bridge
detect-wireless-bridge
detect-wireless-hosted-network
ignore-adhoc-awdl-networks
mac-oui-quiet-time <mac-oui-quiet-time>
no
oui-classification
overlay-classification
privacy
prop-wm-classification
protect-adhoc-enhanced
protect-adhoc-network
protect-adhoc-using-valid-ssid
protect-high-throughput
protect-ht-40mhz
protect-misconfigured-ap
protect-ssid
protect-valid-sta x
protect-wifi-direct-p2p-groups
protect-windows-bridge
protect-wireless-hosted-network
require-wpa
rogue-containment
suspect-rogue-conf-level <suspect-rogue-conf-level>
suspect-rogue-containment
unencrypted-valid-client-quiet-time
valid-and-protected-ssid <valid-and-protected-ssid>
valid-oui <valid-oui>
valid-wired-mac <valid-wired-mac>
vendor-specific-ie-exclusion <oui> <oui type>
wifi-direct-network-quiet-time
wireless-bridge-quiet-time <wireless-bridge-quiet-time>
wireless-hosted-network-quiet-time <wireless-hosted-network-quiet-time>
Description
This command configures detection of unauthorized devices, as well as rogue AP detection and containment. Unauthorized device detection includes the ability to detect and disable rogue APs and other devices that can potentially disrupt network operations.
|
Parameter |
Description |
|
<profile-name> |
Name that identifies an instance of the profile. 1-63 characters
|
|
adhoc-using-valid-ssid- quiet-time |
Time to wait, in seconds, after detecting an ad hoc network using a valid SSID, after which the check can be resumed. 60-360000 seconds 900 seconds |
|
allow-well-known-mac |
Allows devices with known MAC addresses to classify rogues APs. Depending on your network, configure one or more of the following options for classifying rogue APs:
If you modify an existing configuration, the new configuration overrides the original configuration. For example, if you configure Use caution when configuring this command. If the neighboring network uses similar routers, those APs might be classified as rogues. If containment is enabled, clients attempting to associate to an AP classified as a rogue are disconnected through a denial of service attack. To clear the well known MACs in the system, use the following commands:
|
|
cfg-valid-11a-channel <channel> |
List of valid 802.11a channels that third-party APs are allowed to use. 34-165 |
|
cfg-valid-11g-channel <channel> |
List of valid 802.11b/g channels that third-party APs are allowed to use. 1-14 |
|
classification |
Enables or disables rogue AP classification. A rogue AP is one that is unauthorized and plugged into the wired side of the network. Any other AP seen in the RF environment that is not part of the valid enterprise network is considered to be interfering — it has the potential to cause RF interference but it is not connected to the wired network and thus does not represent a direct threat. |
|
clone <source> |
Name of an existing IDS rate thresholds profile from which parameter values are copied. |
|
detect-adhoc-network |
Enables or disables detection of ad hoc networks. |
|
detect-adhoc-using-valid- |
Enables or disables detection of ad hoc networks using valid or protected SSIDs. |
|
detect-bad-wep |
Enables or disables detection of WEP initialization vectors that are known to be weak or repeating. A primary means of cracking WEP keys is to capture 802.11 frames over an extended period of time and search for implementations that are still used by many legacy devices. |
|
detect-ht-greenfield |
Enables or disables detection of high-throughput devices advertising greenfield preamble capability. |
|
detect-invalid-mac-oui |
Enables or disables checking of the first three bytes of a MAC address, known as the organizationally unique identifier (OUI), assigned by the IEEE to known manufacturers. Often clients using a spoofed MAC address do not use a valid OUI and instead use a randomly generated MAC address. Enabling MAC OUI checking causes an alarm to be triggered if an unrecognized MAC address is in use. |
|
detect-misconfigured-ap |
Enables or disables detection of misconfigured APs. An AP is classified as misconfigured if it is classified as valid and does not meet any of the following configurable parameters:
|
|
detect-sta-assoc-to-rogue |
Enables or disables detection of station association to rogue AP. |
|
detect-unencrypted-valid- |
Enables or disables detection of unencrypted valid clients. |
|
detect-valid-client- misassociation |
Enables or disables detection of misassociation between a valid client and an unsafe AP. This setting can detect the following misassociation types:
|
|
detect-valid-ssid-misuse |
Enables or disables detection of Interfering or Neighbor APs using valid or protected SSIDs. |
|
detect-wifi-direct-p2p-groups |
Enables or disables detection of WIFI-Direct P2P groups. |
|
detect-windows-bridge |
Enables or disables detection of Windows station bridging. |
|
detect-wireless-bridge |
Enables or disables detection of wireless bridging. |
|
detect-wireless-hosted- network |
If enabled, this feature can detect the presence of a wireless hosted network. When a wireless hosted network is detected this feature sends a “Wireless Hosted Network” warning level security log message and the wlsxWirelessHostedNetworkDetected SNMP trap. If there are clients associated to the hosted network, this feature will send a “Client Associated To Hosted Network” warning level security log message and the wlsxClientAssociatedToHostedNetworkDetected SNMP trap. |
|
ignore-adhoc-awdl-networks |
Ignore or process frames from adhoc AWDL networks. |
|
mac-oui-quiet-time |
Time, in seconds, that must elapse after an invalid MAC OUI alarm has been triggered before another identical alarm may be triggered. 60-360000 seconds 900 seconds |
|
no |
Negates any configured parameter. |
|
oui-classification |
Enables or disables OUI based rogue AP classification. |
|
overlay-classification |
Enables or disables overlay rogue AP classification. |
|
privacy |
Enables or disables encryption as a valid AP configuration. |
|
prop-wm-classification |
Enables or disables rogue AP classification through propagated wired MACs. |
|
protect-adhoc-enhanced |
Enable or disable advanced protection from open or WEP ad hoc networks. When enhanced ad hoc containment is carried out, a new repeatable event, syslog and SNMP trap will be generated for each containment event. |
|
protect-adhoc-network |
Enable or disable protection from ad hoc networks using WPA or WPA2 security. When ad hoc networks are detected, they are disabled using a DoS attack. |
|
protect-adhoc-using- valid-ssid |
Enable or disable protection from ad hoc networks using valid or protected SSIDs. |
|
protect-high-throughput |
Enable or disable protection of high-throughput (802.11n) devices. |
|
protect-ht-40mhz |
Enable or disable protection of high-throughput (802.11n) devices operating in 40 MHz mode. |
|
protect-misconfigured-ap |
Enable or disable protection of misconfigured APs. |
|
protect-ssid |
Enable or disable use of SSID by valid APs only. |
|
protect-valid-sta |
When enabled, does not allow valid stations to connect to a non-valid AP. |
|
protect-wifi-direct-p2pgroups |
Enable or disable protection from WIFI-Direct P2P Groups. |
|
protect-windows-bridge |
Enable or disable protection of a windows station bridging |
|
protect-wireless-hosted- network |
When you enable the wireless hosted network protection feature, Mobility Conductor enforces containment on a wireless hosted network by launching a denial of service attack to disrupt associations between a Windows 7 software-enabled Access Point (softAP) and a client, and disrupt associations between the client that is hosting the softAP and any access point to which the host connects. When a wireless hosted network triggers this feature, wireless hosted network protection sends the Wireless Hosted Network Containment and The existing generic containment SNMP traps and log messages will also be sent when Wireless Hosted Network Containment or Host of Wireless Network Containment is enforced. |
|
require-wpa |
When enabled, any valid AP that is not using WPA encryption is flagged as misconfigured. |
|
rogue-containment |
Rogue APs can be detected (see classification) but are not automatically disabled. This option automatically shuts down rogue APs. When this option is enabled, clients attempting to associate to an AP classified as a rogue are disconnected through a denial of service attack. |
|
suspect-rogue-conf-level <suspect-rogue-conf-level> |
Confidence level of suspected Rogue AP to trigger containment. When an AP is classified as a suspected rogue AP, it is assigned a 50% confidence level. If multiple APs trigger the same events that classify the AP as a suspected rogue, the confidence level increases by 5% up to 95%. In combination with suspected rogue containment, this option configures the threshold by which containment should occur. Suspected rogue containment occurs only when the configured confidence level is met. 50-100% 60% |
|
suspect-rogue-containment |
Suspected rogue APs are treated as interfering APs, thereby Mobility Conductor attempts to reclassify them as rogue APs. Suspected rogue APs are not automatically contained. In combination with the configured confidence level (see suspect-rogue-conf-level), this option contains the suspected rogue APs. |
|
unencrypted-valid-client-quiet-time <unencrypted-valid-client-quiet-time> |
Time to wait, in seconds, after detecting an unencrypted valid client after which the check can be resumed. 60-360000 seconds 900 seconds |
|
valid-and-protected-ssid <ssid> |
List of valid and protected SSIDs. |
|
valid-oui <valid-oui> |
List of valid MAC OUIs. |
|
valid-wired-mac <valid-wired-mac> |
List of MAC addresses of wired devices in the network, typically gateways or servers. |
|
vendor-specific-ie-exclusion <oui> <oui type> |
Configures exclusions for IDS containment based on vendor specific IE information. This feature allows APs to be exempted from containment even when the devices use randomized MAC addresses. AOS allows for a maximum of five vendor OUI and OUI types to be defined for confinement exclusion. |
|
wifi-direct-network-quiet-time |
Time to wait in seconds after detecting a WIFI-Direct network, after which the check can be resumed. Minimum is 60 seconds |
|
wireless-bridge-quiet-time <wireless-bridge-quiet-time> |
Time, in seconds, that must elapse after a wireless bridge alarm has been triggered before another identical alarm may be triggered. 60-360000 seconds 900 seconds |
|
wireless-hosted-network-quiet-time <wireless-hosted-network-quiet-time>
|
The wireless hosted network detection feature sends a log message and trap when a wireless hosted network is detected. The quiet time defined by this parameter sets the amount of time, in seconds, that must elapse after a wireless hosted network log message or trap has been triggered before an identical log message or trap can be sent again. 60-360000 seconds 900 seconds |
Example
The following command copies the settings from the ids-unauthorized-device-disabled profile and then enables detection and protection from ad hoc networks:
(host) [mynode] (config) #ids unauthorized-device-profile floor7
(host) [mynode] (IDS Unauthorized Device Profile "floor7") #unauth1
(host) [mynode] (IDS Unauthorized Device Profile "floor7") #clone ids-unauthorized-device-disable
(host) [mynode] (IDS Unauthorized Device Profile "floor7") #detect-adhoc-network
(host) [mynode] (IDS Unauthorized Device Profile "floor7") #protect-adhoc-network
Related Commands
|
Command |
Description |
|
Displays an IDS unauthorized device profile. |
Command History
|
Release |
Modification |
|
AOS 8.11.0.0 |
The vendor-specific-ie-exclusion parameter was introduced. |
|
AOS 8.0.0.0 |
Command introduced. |
Command Information
|
Platform |
License |
Command Mode |
|
All platforms |
Requires the RFprotect license. |
Config mode on Mobility Conductor. |