You are here: Home > CLI Commands > Just_CLI_Topics > show references ids

show references ids

show references ids

ap-classification-rule <rule-name>

ap-rule-matching

dos-profile {default | <profile-name>}

general-profile {default | <profile-name>}

impersonation-profile {default | <profile-name>}

management-profile

profile {default | <profile-name>}

rap-wml-server-profile <server-name>

rap-wml-table-profile <table-name>

rate-thresholds-profile {default | <profile-name>}

signature-matching-profile {default | <profile-name>}

signature-profile <profile-name>

unauthorized-device-profile {default | <profile-name>}

wms-general-profile

wms-local-system-profile

Description

This command displays IDSIntrusion Detection System. IDS monitors a network or systems for malicious activity or policy violations and reports its findings to the management system deployed in the network. profile references.

Syntax

Parameter

Description

Default

ap-classification-rule <rule-name>

Shows references to an IDSIntrusion Detection System. IDS monitors a network or systems for malicious activity or policy violations and reports its findings to the management system deployed in the network. AP classification rule profile.

 

ap-rule-matching

Shows references to the IDSIntrusion Detection System. IDS monitors a network or systems for malicious activity or policy violations and reports its findings to the management system deployed in the network. Active AP Rules Profile.

 

dos-profile <profile-name>

Shows references to an IDSIntrusion Detection System. IDS monitors a network or systems for malicious activity or policy violations and reports its findings to the management system deployed in the network. Denial of Service (DoSDenial of Service. DoS is any type of attack where the attackers send excessive messages to flood traffic and thereby preventing the legitimate users from accessing the service.) profile.

default

general-profile <profile-name>

Shows references to an IDSIntrusion Detection System. IDS monitors a network or systems for malicious activity or policy violations and reports its findings to the management system deployed in the network. general profile.

default

impersonation-profile <profile-name>

Shows references to an IDSIntrusion Detection System. IDS monitors a network or systems for malicious activity or policy violations and reports its findings to the management system deployed in the network. impersonation profile.

default

management-profile

Shows references to the IDSIntrusion Detection System. IDS monitors a network or systems for malicious activity or policy violations and reports its findings to the management system deployed in the network. WMS management profile.

 

profile <profile-name>

Shows references to an IDSIntrusion Detection System. IDS monitors a network or systems for malicious activity or policy violations and reports its findings to the management system deployed in the network. profile.

default

rap-wml-server-profile <server-name>

Shows references to an IDSIntrusion Detection System. IDS monitors a network or systems for malicious activity or policy violations and reports its findings to the management system deployed in the network. remote APRemote APs extend corporate network to the users working from home or at temporary work sites. Remote APs are deplyed at branch office sites and are connected to the central network on a WAN link. WML server profile.

 

rap-wml-table-profile <table-name>

Shows references to an IDSIntrusion Detection System. IDS monitors a network or systems for malicious activity or policy violations and reports its findings to the management system deployed in the network. remote APRemote APs extend corporate network to the users working from home or at temporary work sites. Remote APs are deplyed at branch office sites and are connected to the central network on a WAN link. WML table profile

 

rate-thresholds-profile <profile-name>

Shows references to an IDSIntrusion Detection System. IDS monitors a network or systems for malicious activity or policy violations and reports its findings to the management system deployed in the network. rate thresholds profile.

default

signature-matching-profile <profile-name>

Shows references to an IDSIntrusion Detection System. IDS monitors a network or systems for malicious activity or policy violations and reports its findings to the management system deployed in the network. signature matching profile.

default

signature-profile <profile-name>

Shows references to an IDSIntrusion Detection System. IDS monitors a network or systems for malicious activity or policy violations and reports its findings to the management system deployed in the network. signature profile.

default

unauthorized-device-profile <profile-name>

Shows references to an unauthorized device profile.

default

wms-general-profile

Shows references to the IDSIntrusion Detection System. IDS monitors a network or systems for malicious activity or policy violations and reports its findings to the management system deployed in the network. WMS general profile.

 

wms-local-system-profile

Shows references to the IDSIntrusion Detection System. IDS monitors a network or systems for malicious activity or policy violations and reports its findings to the management system deployed in the network. WMS local system profile.

 

Example

Execute the following command to display a list of references for the default IDSIntrusion Detection System. IDS monitors a network or systems for malicious activity or policy violations and reports its findings to the management system deployed in the network. profile.

(host) [mynode] #show references ids profile default

References to IDS Profile "default"

-----------------------------------

Referrer Count

-------- -----

ap-group "default" ids-profile 1

ap-group "NoAuthApGroup" ids-profile 1

Total References:2

Related Commands

Command

Description

ids ap-classification-rule

Configures the IDSIntrusion Detection System. IDS monitors a network or systems for malicious activity or policy violations and reports its findings to the management system deployed in the network. AP classification rule profile.

ids ap-rule-matching

Configures the IDSIntrusion Detection System. IDS monitors a network or systems for malicious activity or policy violations and reports its findings to the management system deployed in the network. active AP rules profile by enabling an AP classification rule.

ids dos-profile

Configures traffic anomalies for denial of service (DoSDenial of Service. DoS is any type of attack where the attackers send excessive messages to flood traffic and thereby preventing the legitimate users from accessing the service.) attacks.

ids general-profile

Configures an IDSIntrusion Detection System. IDS monitors a network or systems for malicious activity or policy violations and reports its findings to the management system deployed in the network. general profile.

ids impersonation-profile

Configures anomalies for impersonation attacks.

ids management-profile

Configures the IDSIntrusion Detection System. IDS monitors a network or systems for malicious activity or policy violations and reports its findings to the management system deployed in the network. WMS management profile.

ids profile

Defines a set of IDSIntrusion Detection System. IDS monitors a network or systems for malicious activity or policy violations and reports its findings to the management system deployed in the network. profiles.

ids rate-thresholds-profile

Configures an IDSIntrusion Detection System. IDS monitors a network or systems for malicious activity or policy violations and reports its findings to the management system deployed in the network. rate thresholds profile.

ids signature-matching-profile

Configures an IDSIntrusion Detection System. IDS monitors a network or systems for malicious activity or policy violations and reports its findings to the management system deployed in the network. signature matching profile.

ids signature-profile

Configures signatures for wireless intrusion detection.

ids unauthorized-device-profile

Configures detection of unauthorized devices, as well as rogue AP detection and containment.

ids wms-general-profile

configures the IDSIntrusion Detection System. IDS monitors a network or systems for malicious activity or policy violations and reports its findings to the management system deployed in the network. WLANWireless Local Area Network. WLAN is a 802.11 standards-based LAN that the users access through a wireless connection. management system (WMS) general profile.

Command History

Release

Modification

ArubaOS 8.0.0.0

Command introduced.

Command Information

Platforms

License

Command Mode

All platforms

Base operating system.

Config or Enable mode on Mobility Master.

/*]]>*/