08-27-2014 08:58 AM
Aruba 3200 controllers running 18.104.22.168. I want to block an SSID that an employee is broadcasting and using while in the office. All I have is the SSID. I also have Airwave.
Solved! Go to Solution.
08-27-2014 09:11 AM
08-27-2014 09:21 AM - edited 08-27-2014 09:22 AM
So I will configure an ids general-profile default
what command to block just SSID "test"
wireless-containment tarpit-non-valid-sta ?
There may be other SSID's that I want to allow that are not configured on the controller.
08-27-2014 11:42 AM
Suspected Rogue Confidence Level
A suspected rogue AP is an AP that is potentially a threat to the WLAN infrastructure. A suspected rogue AP has a confidence level associated with it. An AP can be marked as a suspected rogue if it is determined to be a potentially threat on the wired network, or if it matches a user defined classification rule.
The suspected-rogue classification mechanism are:
Each mechanism that causes a suspected-rogue classification is assigned a confidence level increment of 20%.
AP classification rules have a configured confidence level.
When a mechanism matches a previously unmatched mechanism, the confidence level increment associated with that mechanism is added to the current confidence level (the confident level starts at zero).
The confidence level is capped at 100%.
If your controller reboots, your suspected-rogue APs are not checked against any new rules that were configured after the reboot. Without this restriction, all the mechanisms that classified your APs as suspected-rogue may trigger again causing the confidence level to surpass their cap of 100%. You can explicitly mark an AP as “interfering” to trigger all new rules to match against it.
Lead Mobility Engineer @ Integration Partners
AMFX | ACMX | ACDX | ACCX | CWAP | CWDP | CWNA