Parameter | Description | Value |
---|---|---|
all |
Displays information about all WIDS profiles. |
- |
name profile-name |
Displays information about a specified WIDS profile. |
The WIDS profile must already exist. |
You can run the display wids-profile command to view information about a WIDS profile.
# Display information about all WIDS profiles.
<HUAWEI> display wids-profile all
------------------------------------------------------------
Profile name Reference
------------------------------------------------------------
default 3
huawei 2
office 0
office01 0
------------------------------------------------------------
Total: 4
Item |
Description |
---|---|
Profile name |
Name of a WIDS profile. |
Reference |
Number of times a WIDS profile is referenced. |
# Display information about the WIDS profile huawei.
<HUAWEI> display wids-profile name huawei
------------------------------------------------------------
Device report interval(s) : 60
Brute force detect interval(s) : 20
Brute force detect threshold : 20
Brute force quiet time(s) : 600
Flood detect interval(s) : 10
Flood detect threshold : 1
Flood quiet time(s) : 600
Weak IV quiet time(s) : 600
Spoof quiet time(s) : 600
Dynamic blacklist : enable
Contain rogue mode : spoof SSID AP
open-authentication rogue AP
client
client protect
Ad hoc
Contain minimum RSSI(dBm) : -
Contain minimum sta number : -
STA whitelist profile : STA_whitelist
WIDS spoof profile : huawei
WIDS whitelist profile : huawei
------------------------------------------------------------
Item |
Description |
---|---|
Device report interval(s) |
Interval at which an AP reports the detected incremental wireless device information. To configure this parameter, run the device report-interval command. |
Brute force detect interval(s) |
Interval for brute force key cracking detection. To configure this parameter, run the brute-force-detect interval command. |
Brute force detect threshold |
Maximum number of key negotiation failures allowed within a brute force key cracking detection period. To configure this parameter, run the brute-force-detect threshold command. |
Brute force quiet time(s) |
Quiet time for an AP to report the detected brute force attacks to the AC. To configure this parameter, run the brute-force-detect quiet-time command. |
Flood detect interval(s) |
Flood attack detection interval. To configure this parameter, run the flood-detect interval command. |
Flood detect threshold |
Flood attack detection threshold. To configure this parameter, run the flood-detect threshold command. |
Flood quiet time(s) |
Quiet time for an AP to report the detected flood attacks to the AC. To configure this parameter, run the flood-detect quiet-time command. |
Weak IV quiet time(s) |
Quiet time for an AP to report the detected weak IV attacks to the AC. To configure this parameter, run the weak-iv-detect quiet-time command. |
Spoof quiet time(s) |
Quiet time for an AP to report the detected spoofing attacks to the AC. To configure this parameter, run the spoof-detect quiet-time command. |
Dynamic blacklist |
Whether the dynamic blacklist function is enabled. To configure this parameter, run the dynamic-blacklist disable command. |
Contain rogue mode |
Containment mode against rogue devices. To configure this parameter, run the contain-mode command. |
Contain minimum RSSI(dBm) |
Minimum RSSI value for containing rogue and interfering devices based on the RSSI of the devices. To configure this parameter, run the contain command. |
Contain minimum sta number |
Minimum number of associated STAs for containing rogue and interfering devices based on the number of STAs associated with the devices. To configure this parameter, run the contain command. |
STA whitelist profile |
STA protection based on a STA whitelist. To configure this parameter, run the contain-mode command. |
WIDS spoof profile |
WIDS spoof SSID profile bound to the WIDS profile. To configure this parameter, run the wids-spoof-profile (WIDS profile view) command. |
WIDS whitelist profile |
WIDS whitelist profile bound to the WIDS profile. To configure this parameter, run the wids-whitelist-profile (WIDS profile view) command. |