02-WLAN Command Reference

HomeSupportReference GuidesCommand ReferencesH3C WA Series Access Points Command References(R1507P09)-6W10102-WLAN Command Reference
05-WLAN IDS Commands
Title Size Download
05-WLAN IDS Commands 90.58 KB

WLAN IDS detection configuration commands

attack-detection enable

Use attack-detection enable to enable WIDS-IPS detection of various DoS attacks.

Use undo attack-detection enable to restore the default.

Syntax

attack-detection enable { all | flood | spoof | weak-iv }

undo attack-detection enable

Default

No WIDS-IPS detection is enabled.

Views

WLAN IDS view

Default command level

2: System level

Parameters

all: Enables detection of all kinds of attacks.

flood: Enables detection of flood attacks.

spoof: Enables detection of spoof attacks.

weak-iv: Enables weak-IV detection.

Examples

# Enable spoof attack detection.

<Sysname> system-view

[Sysname] wlan ids

[Sysname-wlan-ids] attack-detection enable spoof

display wlan ids history

Use display wlan ids history to display the history of attacks detected in the WLAN system. It supports a maximum of 512 entries.

Syntax

display wlan ids history [ | { begin | exclude | include } regular-expression ]

Views

Any view

Default command level

1: Monitor level

Parameters

|: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide.

begin: Displays the first line that matches the specified regular expression and all lines that follow.

exclude: Displays all lines that do not match the specified regular expression.

include: Displays all lines that match the specified regular expression.

regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.

Examples

# Display the history of attacks.

<Sysname> display wlan ids history

 Total Number of Entries: 5

  Flags:

   act = Action Frame             asr = Association Request

   aur = Authentication Request   daf = Deauthentication Frame

   dar = Disassociation Request   ndf = Null Data Frame

   pbr = Probe Request            rar = Reassociation Request

   saf = Spoofed Disassociation Frame

   sdf = Spoofed Deauthentication Frame    

   wiv = Weak IV Detected

   AT - Attack Type, Ch - Channel Number, AR - Average RSSI

                              WIDS History Table

--------------------------------------------------------------------------

 MAC Address      AT    Ch    AR    Detected Time          AP

--------------------------------------------------------------------------

 0027-E699-CA71   asr   8     44    2010-06-12/19:47:54    ap12

 0015-E9A4-D7F4   wiv   8     45    2010-06-12/19:45:28    ap48

 0027-E699-CA71   asr   8     20    2010-06-12/19:18:17    ap12

 003d-B5A6-539F   pbr   8     43    2010-06-12/19:10:48    ap56

 0015-E9A4-D7F4   wiv   8     50    2010-06-12/19:01:28    ap48

--------------------------------------------------------------------------

Table 1 Command output

Field

Description

MAC-Address

In case of spoof attacks, this field displays the BSSID that was spoofed. In case of other attacks, this field displays the MAC address of the device that initiated the attack.

AT

Type of attack.

Ch

Channel in which the attack was detected.

AR

Average RSSI of the attack frames.

Detected time

Time at which this attack was detected.

 

display wlan ids statistics

Use display wlan ids statistics to display WLAN IDS statistics.

Syntax

display wlan ids statistics [ | { begin | exclude | include } regular-expression ]

Views

Any view

Default command level

1: Monitor level

Parameters

|: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide.

begin: Displays the first line that matches the specified regular expression and all lines that follow.

exclude: Displays all lines that do not match the specified regular expression.

include: Displays all lines that match the specified regular expression.

regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.

Examples

# Display WLAN IDS statistics.

<Sysname> display wlan ids statistics

 Current attack tracking since: 2010-06-21/12:46:33                      

----------------------------------------------------------------------

 Type                                            Current       Total      

----------------------------------------------------------------------

 Probe Request Frame Flood Attack                2             7         

 Authentication Request Frame Flood Attack       0             0         

 Deauthentication Frame Flood Attack             0             0         

 Association Request Frame Flood Attack          1             1         

 Disassociation Request Frame Flood Attack       4             8         

 Reassociation Request Frame Flood Attack        0             0          

 Action Frame Flood Attack                       0             0          

 Null Data Frame Flood Attack                    0             0          

 Weak IVs Detected                               12            21        

 Spoofed Deauthentication Frame Attack           0             0         

 Spoofed Disassociation Frame Attack             0             2         

----------------------------------------------------------------------

Table 2 Command output

Field

Description

Current

Provides the count of attacks detected since the time specified by the current attack tracking time (specified in the field "Current attack tracking since:"). The current attack tracking time is started at the system startup and is refreshed each hour subsequently.

Total

Provides the total count of the attacks detected since the system startup.

Probe Request Frame Flood Attack

Number of probe request frame flood attacks detected.

Authentication Request Frame Flood Attack

Number of authentication request frame flood attack detected.

Deauthentication Frame Flood Attack

Number of de-authentication frame flood attacks detected.

Association Request Frame Flood Attack

Number of association request frame flood attacks detected.

Disassociation Request Frame Flood Attack

Number of disassociation request frame flood attacks detected.

Reassociation Request Frame Flood Attack

Number of reassociation request frame flood attacks detected.

Action Frame Flood Attack

Number of action frame flood attacks detected.

Null Data Frame Flood Attack

Number of null data frame flood attacks detected.

Weak IVs Detected

Number of weak IVs detected.

Spoofed Deauthentication Frame Attack

Number of spoofed deauthentication frame attacks detected.

Spoofed Disassociation Frame Attack

Number of spoofed disassociation frame attacks detected.

 

reset wlan ids history

Use reset wlan ids history to clear the history information of attacks detected in the WLAN.

Syntax

reset wlan ids history

Views

User view

Default command level

1: Monitor level

Usage guidelines

After this command is executed, all the history information regarding attacks will be cleared, and the history table will be empty.

Examples

# Clear all history information of attacks.

<Sysname> reset wlan ids history

reset wlan ids statistics

Use reset wlan ids statistics to clear the statistics of attacks detected in the WLAN system.

Syntax

reset wlan ids statistics

Views

User view

Default command level

1: Monitor level

Usage guidelines

This command clears both the "current" and "total" of all attack types in the WLAN IDS statistics table.

Examples

# Clear WLAN IDS statistics.

<Sysname>reset wlan ids statistics

wlan device-detection enable

Use wlan device-detection enable to configure the AP to operate in hybrid mode.

Use undo wlan device-detection enable to restore the default.

Syntax

wlan device-detection enable

undo wlan device-detection enable

Default

The AP operates in normal mode to provide WLAN services.

Views

System view

Default command level

2: System level

Usage guidelines

If the AP operates in monitor mode, the command is invisible.

If the AP operates in hybrid mode, configure a service template so the AP can provide both WLAN access and rogue detection services.

Examples

# Set the hybrid operation mode for the AP.

<Sysname> system-view

[Sysname] wlan device-detection enable

wlan ids

Use wlan ids to enter WLAN IDS view.

Syntax

wlan ids

Views

System view

Default command level

2: System level

Usage guidelines

This view enables you to configure WLAN IDS parameters such as scan parameters and device lists.

Examples

# Enter WLAN IDS view.

<Sysname> system-view

[Sysname] wlan ids

[Sysname-wlan-ids]

wlan work-mode monitor

Use wlan work-mode monitor to configure the AP to operate in monitor mode.

Use undo wlan work-mode monitor to restore the default.

Syntax

wlan work-mode monitor

undo wlan work-mode monitor

Default

The AP operates in normal mode to provide WLAN services.

Views

System view

Default command level

2: System level

Usage guidelines

If the AP operates in monitor mode, the AP can only operate as a monitor AP and cannot operate as an access AP, and cannot provide WLAN services.

Before switching the AP operating mode from hybrid to normal, use the undo wlan device-detection enable command to disable the hybrid mode.

Examples

# Set the monitor operation mode for the AP.

<Sysname> system-view

[Sysname] wlan work-mode monitor

 


Blacklist and whitelist configuration commands

display wlan blacklist

Use display wlan blacklist to display the static or dynamic blacklist entries.

Syntax

display wlan blacklist { static | dynamic } [ | { begin | exclude | include } regular-expression ]

Views

Any view

Default command level

1: Monitor level

Parameters

static: Displays static blacklist entries.

dynamic: Displays dynamic blacklist entries.

|: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide.

begin: Displays the first line that matches the specified regular expression and all lines that follow.

exclude: Displays all lines that do not match the specified regular expression.

include: Displays all lines that match the specified regular expression.

regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.

Examples

# Display information about the static blacklist.

<Sysname> display wlan blacklist static

Total Number of Entries: 3

                               Static Blacklist

--------------------------------------------------------------------------

 MAC-Address

--------------------------------------------------------------------------

 0014-6c8a-43ff

 0016-6F9D-61F3

 0019-5B79-F04A

--------------------------------------------------------------------------

Table 3 Command output

Field

Description

MAC-Address

MAC addresses of clients.

 

# Display information about the dynamic blacklist.

<Sysname> display wlan blacklist dynamic

Total Number of Entries: 3

                               Dynamic Blacklist

-------------------------------------------------------------------------------

 MAC-Address    APID Lifetime(s) Blacklisted For (hh:mm:ss)   Reason

-------------------------------------------------------------------------------

 000f-e2cc-0001 1    60          00:02:11                     Assoc-Flood

 000f-e2cc-0002 2    60          00:01:17                     Deauth-Flood

 000f-e2cc-0003 3    60          00:02:08                     Auth-Flood

Table 4 Command output

Field

Description

MAC-Address

MAC address of the device inserted into the dynamic blacklist.

APID

AP ID of the corresponding entry in the dynamic blacklist.

Lifetime(s)

Lifetime of the corresponding entry in seconds.

Blacklisted For (hh:mm:ss)

Time elapsed since the entry was last updated.

Reason

Reason why the entry was added into the dynamic blacklist.

 

display wlan whitelist

Use display wlan whitelist to display the configured white list.

Syntax

display wlan whitelist [ | { begin | exclude | include } regular-expression ]

Views

Any view

Default command level

1: Monitor level

Parameters

|: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide.

begin: Displays the first line that matches the specified regular expression and all lines that follow.

exclude: Displays all lines that do not match the specified regular expression.

include: Displays all lines that match the specified regular expression.

regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.

Examples

# Display the white list.

<Sysname> display wlan whitelist

Total Number of Entries: 3

                               Whitelist

--------------------------------------------------------------------------

 MAC-Address

--------------------------------------------------------------------------

 000e-35b2-000e

 0019-5b8e-b709

 001c-f0bf-9c92

 0000-0000-00EE

 0400-0000-0000

 0400-0000-00EE

--------------------------------------------------------------------------

Table 5 Command output

Field

Description

MAC-Address

MAC addresses of clients in the white list.

 

dynamic-blacklist enable

Use dynamic-blacklist enable to enable the dynamic blacklist feature.

Use undo dynamic-blacklist enable to disable the dynamic blacklist feature.

Syntax

dynamic-blacklist enable

undo dynamic-blacklist enable

Default

The dynamic blacklist feature is disabled.

Views

WLAN IDS view

Default command level

2: System level

Parameters

enable: Enables the dynamic blacklist feature.

Usage guidelines

With this feature, a WLAN device, upon detecting flood attacks from a device, adds the device to the dynamic blacklist, and denies any packets from this device until the dynamic blacklist entry ages out.

The maximum number of entries in the dynamic blacklists depends on the device model.

Examples

# Enable the dynamic blacklist feature.

<Sysname> system-view

[Sysname] wlan ids

[Sysname-wlan-ids] dynamic-blacklist enable

dynamic-blacklist lifetime

Use dynamic-blacklist lifetime to set the lifetime for dynamic blacklist entries.

Use undo dynamic-blacklist lifetime to restore the default.

Syntax

dynamic-blacklist lifetime lifetime

undo dynamic-blacklist lifetime

Default

The lifetime is 300 seconds.

Views

WLAN IDS view

Default command level

2: System level

Parameters

lifetime: Interval, in the range of 60 to 3600 seconds.

Usage guidelines

If a dynamic blacklist entry is not detected within the lifetime, the entry is removed from the dynamic blacklist.

Examples

# Specify a lifetime of 1200 seconds for dynamic blacklist entries.

<Sysname> system-view

[Sysname] wlan ids

[Sysname-wlan-ids] dynamic-blacklist lifetime 1200

reset wlan dynamic-blacklist

Use reset wlan dynamic-blacklist to remove a specified entry or all entries from the dynamic blacklist.

Syntax

reset wlan dynamic-blacklist { mac-address mac-address | all }

Views

User view

Default command level

1: Monitor level

Parameters

mac-address mac-address: Removes an entry with the specified MAC address from the dynamic blacklist.

all: Removes all entries from the dynamic blacklist.

Usage guidelines

The maximum number of entries in the dynamic blacklist is 128.

Examples

# Remove a client with MAC address 001d-0f31-87d from the dynamic blacklist.

<Sysname> reset wlan dynamic-blacklist mac-address 001d-0f31-87d

static-blacklist mac-address

Use static-blacklist mac-address to add a client with a specified MAC address to the static blacklist.

Use undo static-blacklist to remove the client with the specified MAC address or all clients from the static blacklist.

Syntax

static-blacklist mac-address mac-address

undo static-blacklist { mac-address mac-address | all }

Views

WLAN IDS view

Default command level

2: System level

Parameters

mac-address: Adds/deletes a client to/from the static blacklist.

all: Deletes all entries from the static blacklist.

Default

No static blacklist exists.

Usage guidelines

Clients in the static blacklist cannot get associated with the AP.

The maximum number of entries in the static blacklist depends on the device model.

Examples

# Add the client with MAC address 0014-6c8a-43ff to the static blacklist.

<Sysname> system-view

[Sysname] wlan ids

[Sysname-wlan-ids] static-blacklist mac-address 0014-6c8a-43ff

whitelist mac-address

Use whitelist mac-address to add a client with a specified MAC address to the white list.

Use undo whitelist to remove the client with the specified MAC address or all clients from the white list.

Syntax

whitelist mac-address mac-address

undo whitelist { mac-address mac-address | all }

Views

WLAN IDS view

Default command level

2: System level

Parameters

mac-address: Adds/deletes the client with the MAC address to/from the white list.

all: Deletes all entries from the white list.

Default

No white list exists.

Usage guidelines

Clients in the white list can be associated with the AP.

The maximum number of entries in the white list depends on the device model.

Examples

# Add the client with MAC address 001c-f0bf-9c92 to the white list.

<Sysname> system-view

[Sysname] wlan ids

[Sysname-wlan-ids] whitelist mac-address 001c-f0bf-9c92

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Intelligent Storage
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
  • Technical Blogs
All Support
  • Become A Partner
  • Partner Policy & Program
  • Global Learning
  • Partner Sales Resources
  • Partner Business Management
  • Service Business
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网