You are here: Home > CLI Commands > Just_CLI_Topics > ids profile

ids profile

ids profile <profile-name>

clone <source>

dos-profile <profile-name>

general-profile <profile-name>

impersonation-profile <profile-name>

no

signature-matching-profile <profile-name>

unauthorized-device-profile <profile-name>

Description

This command defines a set of IDSIntrusion Detection System. IDS monitors a network or systems for malicious activity or policy violations and reports its findings to the management system deployed in the network. profiles.

Syntax

Parameter

Description

Default

<profile-name>

Name that identifies an instance of the profile. The name must be 1-63 characters.

“default”

clone <source>

Name of an existing IDSIntrusion Detection System. IDS monitors a network or systems for malicious activity or policy violations and reports its findings to the management system deployed in the network. profile from which parameter values are copied.

dos-profile <profile-name>

Name of a IDSIntrusion Detection System. IDS monitors a network or systems for malicious activity or policy violations and reports its findings to the management system deployed in the network. DoSDenial of Service. DoS is any type of attack where the attackers send excessive messages to flood traffic and thereby preventing the legitimate users from accessing the service. profile to be applied to the AP group or name. See ids dos-profile.

“default”

general-profile <profile-name>

Name of an IDSIntrusion Detection System. IDS monitors a network or systems for malicious activity or policy violations and reports its findings to the management system deployed in the network. general profile to be applied to the AP group or name. See ids general-profile.

“default”

impersonation-profile

<profile-name>

Name of an IDSIntrusion Detection System. IDS monitors a network or systems for malicious activity or policy violations and reports its findings to the management system deployed in the network. impersonation profile to be applied to the AP group or name. See ids impersonation-profile.

“default”

no

Negates any configured parameter.

signature-matching-profile

<profile-name>

Name of an IDSIntrusion Detection System. IDS monitors a network or systems for malicious activity or policy violations and reports its findings to the management system deployed in the network. signature matching profile to be applied to the AP group or name. See ids signature-matching-profile

“default”

unauthorized-device-profile

<profile-name>

Name of an IDSIntrusion Detection System. IDS monitors a network or systems for malicious activity or policy violations and reports its findings to the management system deployed in the network. unauthorized device profile to be applied to the AP group or name. See ids unauthorized-device-profile.

“default”

Usage Guidelines

This command defines a set of IDSIntrusion Detection System. IDS monitors a network or systems for malicious activity or policy violations and reports its findings to the management system deployed in the network. profiles that you can then apply to an AP group (with the ap-group command) or to a specific AP (with the ap-name command).

Example

The following command defines a set of IDSIntrusion Detection System. IDS monitors a network or systems for malicious activity or policy violations and reports its findings to the management system deployed in the network. profiles:

(host) [mynode] (config) #ids profile floor2

(host) [mynode] (IDS Profile "floor2") #dos-profile dos1

general-profile general1

impersonation-profile mitm1

signature-matching-profile sig1

unauthorized-device-profile unauth1

Related Commands

Command

Description

ids dos-profile

Configures an IDSIntrusion Detection System. IDS monitors a network or systems for malicious activity or policy violations and reports its findings to the management system deployed in the network. DoSDenial of Service. DoS is any type of attack where the attackers send excessive messages to flood traffic and thereby preventing the legitimate users from accessing the service. profile.

ids general-profile

Configures an IDSIntrusion Detection System. IDS monitors a network or systems for malicious activity or policy violations and reports its findings to the management system deployed in the network. general profile.

ids impersonation-profile

Configures an IDSIntrusion Detection System. IDS monitors a network or systems for malicious activity or policy violations and reports its findings to the management system deployed in the network. impersonation profile.

ids signature-matching-profile

Configures an IDSIntrusion Detection System. IDS monitors a network or systems for malicious activity or policy violations and reports its findings to the management system deployed in the network. signature matching profile.

ids unauthorized-device-profile

Configures an IDSIntrusion Detection System. IDS monitors a network or systems for malicious activity or policy violations and reports its findings to the management system deployed in the network. unauthorized device profile.

show ids profile

Displays all IDSIntrusion Detection System. IDS monitors a network or systems for malicious activity or policy violations and reports its findings to the management system deployed in the network. profiles or a specific IDSIntrusion Detection System. IDS monitors a network or systems for malicious activity or policy violations and reports its findings to the management system deployed in the network. profile.

Command History

Release

Description

ArubaOS 8.0.0.0

Command introduced.

Command Information

Platform

License

Command Mode

All platforms

Requires the RFprotect license.

Config mode on Mobility Master.

/*]]>*/