< Home

(Optional) Configuring Fuzzy Matching Rules for Identifying Spoofing SSIDs

Context

WLAN services are available in public places, such as banks and airports. Users can connect to the WLANs after associating with corresponding SSIDs. If a rogue AP is deployed and provides spoofing SSIDs similar to authorized SSIDs, the users may be misled and connect to the rogue AP, which brings security risks. To address this problem, configure a fuzzy matching rule to identify spoofing SSIDs. The device compares a detected SSID with the matching rule. If the SSID matches the rule, the SSID is considered a spoofing SSID. The AP using the spoofing SSID is a rogue AP. After rogue AP containment is configured, the device contains the rogue AP and disconnects users from the spoofing SSID.

Procedure

  1. Run system-view

    The system view is displayed.

  2. Run wlan

    The WLAN view is displayed.

  3. Run wids-spoof-profile name profile-name

    A WIDS spoof SSID profile is created and the WIDS spoof SSID profile view is displayed.

    By default, the system has a default WIDS spoof SSID profile default.

  4. Run spoof-ssid fuzzy-match regex regex-value

    The fuzzy matching rule is configured for spoofing SSIDs.

    By default, no fuzzy matching rule is configured for spoofing SSIDs.

  5. Run quit

    Return to the WLAN view.

  6. Run wids-profile name profile-name

    The WIDS profile view is displayed.

  7. Run wids-spoof-profile profile-name

    The WIDS spoof SSID profile is applied to the WIDS profile.

    By default, the WIDS spoof SSID profile default is bound to a WIDS profile.

Copyright © Huawei Technologies Co., Ltd.
Copyright © Huawei Technologies Co., Ltd.
< Previous topic Next topic >