< Home

display wids-profile

Function

The display wids-profile command displays information about a WIDS profile.

Format

display wids-profile { all | name profile-name }

Parameters

Parameter Description Value

all

Displays information about all WIDS profiles.

-

name profile-name

Displays information about a specified WIDS profile.

The WIDS profile must already exist.

Views

All views

Default Level

1: Monitoring level

Usage Guidelines

You can run the display wids-profile command to view information about a WIDS profile.

Example

# Display information about all WIDS profiles.

<HUAWEI> display wids-profile all
------------------------------------------------------------
Profile name                   Reference
------------------------------------------------------------
default                            3
huawei                             2
office                             0
office01                           0
------------------------------------------------------------
Total: 4
Table 1 Description of the display wids-profile all command output

Item

Description

Profile name

Name of a WIDS profile.

Reference

Number of times a WIDS profile is referenced.

# Display information about the WIDS profile huawei.

<HUAWEI> display wids-profile name huawei
------------------------------------------------------------
Device report interval(s)            : 60
Brute force detect interval(s)       : 20
Brute force detect threshold         : 20
Brute force quiet time(s)            : 600
Flood detect interval(s)             : 10
Flood detect threshold               : 1
Flood quiet time(s)                  : 600
Weak IV quiet time(s)                : 600
Spoof quiet time(s)                  : 600
Dynamic blacklist                    : enable
Contain rogue mode                   : spoof SSID AP
                                       open-authentication rogue AP
                                       client
                                       client protect
                                       Ad hoc
Contain minimum RSSI(dBm)            : -                                         
Contain minimum sta number           : -      
STA whitelist profile                : STA_whitelist        
WIDS spoof profile                   : huawei
WIDS whitelist profile               : huawei
------------------------------------------------------------
Table 2 Description of the display wids-profile name command output

Item

Description

Device report interval(s)

Interval at which an AP reports the detected incremental wireless device information.

To configure this parameter, run the device report-interval command.

Brute force detect interval(s)

Interval for brute force key cracking detection.

To configure this parameter, run the brute-force-detect interval command.

Brute force detect threshold

Maximum number of key negotiation failures allowed within a brute force key cracking detection period.

To configure this parameter, run the brute-force-detect threshold command.

Brute force quiet time(s)

Quiet time for an AP to report the detected brute force attacks to the AC.

To configure this parameter, run the brute-force-detect quiet-time command.

Flood detect interval(s)

Flood attack detection interval.

To configure this parameter, run the flood-detect interval command.

Flood detect threshold

Flood attack detection threshold.

To configure this parameter, run the flood-detect threshold command.

Flood quiet time(s)

Quiet time for an AP to report the detected flood attacks to the AC.

To configure this parameter, run the flood-detect quiet-time command.

Weak IV quiet time(s)

Quiet time for an AP to report the detected weak IV attacks to the AC.

To configure this parameter, run the weak-iv-detect quiet-time command.

Spoof quiet time(s)

Quiet time for an AP to report the detected spoofing attacks to the AC.

To configure this parameter, run the spoof-detect quiet-time command.

Dynamic blacklist

Whether the dynamic blacklist function is enabled.

To configure this parameter, run the dynamic-blacklist disable command.

Contain rogue mode

Containment mode against rogue devices.

To configure this parameter, run the contain-mode command.

Contain minimum RSSI(dBm)

Minimum RSSI value for containing rogue and interfering devices based on the RSSI of the devices.

To configure this parameter, run the contain command.

Contain minimum sta number

Minimum number of associated STAs for containing rogue and interfering devices based on the number of STAs associated with the devices.

To configure this parameter, run the contain command.

STA whitelist profile

STA protection based on a STA whitelist.

To configure this parameter, run the contain-mode command.

WIDS spoof profile

WIDS spoof SSID profile bound to the WIDS profile.

To configure this parameter, run the wids-spoof-profile (WIDS profile view) command.

WIDS whitelist profile

WIDS whitelist profile bound to the WIDS profile.

To configure this parameter, run the wids-whitelist-profile (WIDS profile view) command.

Copyright © Huawei Technologies Co., Ltd.
Copyright © Huawei Technologies Co., Ltd.
< Previous topic Next topic >