You are here: Home > CLI Commands > Just_CLI_Topics > ids management-profile

ids management-profile

ids management-profile

event-correlation [logs-and-traps|logs-only|none|traps-only]

event-correlation-quiet-time <event-correlation-quiet-time>

Description

This command configures the IDSIntrusion Detection System. IDS monitors a network or systems for malicious activity or policy violations and reports its findings to the management system deployed in the network. WMS management profile.

Syntax

Parameter

Description

Range

Default

event-correlation

Correlation mode for IDSIntrusion Detection System. IDS monitors a network or systems for malicious activity or policy violations and reports its findings to the management system deployed in the network. event traps and syslogs (logs). Event correlation can be enabled with generation of correlated logs, traps, or both. To disable correlation, enter the keyword none.

logs-and-traps: Enables IDSIntrusion Detection System. IDS monitors a network or systems for malicious activity or policy violations and reports its findings to the management system deployed in the network. event correlation with generation of correlated syslogs and traps.

logs-only: Enables IDSIntrusion Detection System. IDS monitors a network or systems for malicious activity or policy violations and reports its findings to the management system deployed in the network. event correlation with generation of correlated syslogs only.

none: Disables IDSIntrusion Detection System. IDS monitors a network or systems for malicious activity or policy violations and reports its findings to the management system deployed in the network. event correlation.

traps-only: Enables IDSIntrusion Detection System. IDS monitors a network or systems for malicious activity or policy violations and reports its findings to the management system deployed in the network. event correlation with generation of correlated traps only.

logs-and-
traps

event-correlation-quiet-time

 

Time to wait, in seconds, after generating a correlated event after which the event could be raised again. This only applies to events that are repeatedly raised by an AP.

30-360000 seconds

900 seconds

Usage Guidelines

Manage the events correlation for IDSIntrusion Detection System. IDS monitors a network or systems for malicious activity or policy violations and reports its findings to the management system deployed in the network. event traps and syslogs (logs).

Example

(host) [mynode] (config) #ids management-profile

(host) [mynode] (IDS Management Profile) #event-correlation-quiet-time 30

(host) [mynode] (IDS Management Profile) #event-correlation logs-and-traps

Related Commands

Command

Description

show ids management-profile

Displays the IDSIntrusion Detection System. IDS monitors a network or systems for malicious activity or policy violations and reports its findings to the management system deployed in the network. WMS management profile.

Command History

Release

Modification

ArubaOS 8.0.0.0

Command introduced.

Command Information

Platforms

Licensing

Command Mode

All platforms

Requires the RFprotect license.

Config mode on Mobility Master.

/*]]>*/