01-14 WLAN Security Configuration Commands (Common AP) PDF
01-14 WLAN Security Configuration Commands (Common AP) PDF
Function
The anti-attack flood blacklist enable command enables the flood blacklist
function.
The undo anti-attack flood blacklist enable command disables the flood
blacklist function.
Format
anti-attack flood { arp | dhcp | dhcpv6 | igmp | mdns | nd | other-broadcast |
other-multicast } blacklist enable
Parameters
Parameter Description Value
nd Indicates whether to -
enable the ND flood
blacklist function.
Views
VAP profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After the protocol-based flood blacklist function is enabled, the device considers
traffic of a specified protocol (such as DHCP or ARP) with a rate higher than that
specified in anti-attack flood sta-rate-threshold a flood attack and adds the STA
to the blacklist.
Prerequisites
The flood prevention function has been enabled using the undo anti-attack flood
disable command.
Example
# Enable the DHCP flood blacklist function.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] vap-profile name profile1
[HUAWEI-wlan-vap-prof-profile1] anti-attack flood dhcp blacklist enable
Function
The anti-attack flood disable disables the flood prevention function.
The undo anti-attack flood disable command enables the flood prevention
function.
Format
anti-attack flood { all | arp | dhcp | dhcpv6 | igmp | mdns | nd | other-broadcast
| other-multicast } disable
undo anti-attack flood { all | arp | dhcp | dhcpv6 | igmp | mdns | nd | other-
broadcast | other-multicast } disable
Parameters
Parameter Description Value
nd Indicates whether to -
enable the ND flood
prevention function.
Views
VAP profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If a large number of packets are sent to a device in a short time, the device
becomes busy processing the packets and cannot process normal services. To
prevent flood attacks, you can configure protocol-based flood prevention.
Precautions
The flood prevention function takes effect only for incoming traffic on an AP's
wired interface.
Example
# Disable the DHCP flood prevention function.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] vap-profile name profile1
[HUAWEI-vap-prof-profile1] anti-attack flood dhcp disable
Function
The anti-attack flood sta-rate-threshold command sets the flood threshold.
The default flood threshold is 4 pps for ARP, DHCP, DHCPv6, IGMP, and mDNS
packets, 8 pps for ND packets, 10 pps for broadcast packets other than ARP, DHCP,
DHCPv6, and ND packets, and 10 pps for multicast packets other than IGMP and
mDNS packets.
Format
anti-attack flood { arp | dhcp | dhcpv6 | igmp | mdns | nd | other-broadcast |
other-multicast } sta-rate-threshold sta-rate-threshold
Parameters
Parameter Description Value
nd Specifies ND packets. -
Views
VAP profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After the flood prevention function is enabled, you can run this command to set
the broadcast traffic threshold.
When the traffic rate exceeds the threshold, the device considers a flood attack
from the STA and discards the traffic. This prevents the upper-layer network from
being affected by the flood.
If the flood blacklist function is enabled using the anti-attack flood blacklist
enable command, the device adds flood STAs to the blacklist.
Prerequisites
The flood prevention function has been enabled using the undo anti-attack flood
disable command.
Precautions
The flood prevention function takes effect only for incoming traffic on an AP's
wired interface.
Example
# Set the DHCP flood threshold to 100 pps.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] vap-profile name profile1
[HUAWEI-vap-prof-profile1] anti-attack flood dhcp sta-rate-threshold 100
Format
arp anti-attack check user-bind enable
undo arp anti-attack check user-bind enable
Parameters
None
Views
VAP profile view
Default Level
2: Configuration level
Usage Guidelines
DAI allows an AP to detect the ARP Request and Reply packets transmitted on the
VAPs of the AP, to discard invalid and attack ARP packets, and to record an alarm.
This function prevents ARP packets of unauthorized users from accessing the
external network through the AP, protecting authorized users against interference
or spoofing, and protecting the AP.
● Invalid ARP packets: The source IP and MAC addresses of ARP Request and
Reply packets do not match.
● Attack ARP packets: When an AP receives a large number of consecutive ARP
packets and the number of ARP packets exceeds the ARP attack alarm
threshold, an ARP attack occurs.
Example
# Enable DAI.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] vap-profile name vap1
[HUAWEI-wlan-vap-prof-vap1] arp anti-attack check user-bind enable
The undo brute-force-detect interval command restores the default interval for
brute force key cracking detection.
By default, the interval for brute force key cracking detection is 60 seconds.
Format
brute-force-detect interval interval
Parameters
Parameter Description Value
interval Specifies the interval for brute force key The value is an
interval cracking detection. integer that ranges
from 10 to 120, in
seconds.
Views
WIDS view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
In a brute force key cracking attack, an attacker tries all possible key combinations
one by one to obtain the correct password. To improve password security, enable
defense against brute force key cracking to prolong the time used to crack
passwords.
Follow-up Procedure
Example
# Set the interval for brute force key cracking detection to 100 seconds.
<HUAWEI> system-view
[HUAWEI] interface wlan-radio 0/0/1
[HUAWEI-wlan-Radio0/0/1] wids attack detect enable wpa-psk
[HUAWEI-wlan-Radio0/0/1] quit
[HUAWEI] wlan
[HUAWEI-wlan-view] wids
[HUAWEI-wlan-wids] brute-force-detect interval 100
By default, the quiet time for an AP to record brute force key attacks is 600
seconds.
Format
brute-force-detect quiet-time quiet-time-value
Parameters
Parameter Description Value
Views
WIDS view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After attack detection is enabled on an AP, the AP reports alarms upon attack
detection. If an attack source launches attacks repeatedly, a large number of
repeated alarms are generated. To prevent this situation, configure the quiet time
function for attack detection. When detecting attack sources of the same MAC
address, the AP does not report alarms in the quiet time. However, if the AP still
detects attacks from the attack source after the quiet time expires, the AP reports
alarms. You can set the quiet time based on attack types.
To obtain attack information in a timely manner, set the quiet time to a small
value. If attacks are frequently detected, set the quiet time to a large value to
prevent frequent alarm reports.
Follow-up Procedure
Example
# Set the quiet time for an AP to record brute force key attacks to 300 seconds.
<HUAWEI> system-view
[HUAWEI] interface wlan-radio 0/0/1
[HUAWEI-wlan-Radio0/0/1] wids attack detect enable wpa-psk
[HUAWEI-wlan-Radio0/0/1] quit
[HUAWEI] wlan
[HUAWEI-wlan-view] wids
[HUAWEI-wlan-wids] brute-force-detect quiet-time 300
Format
brute-force-detect threshold threshold
undo brute-force-detect threshold
Parameters
Parameter Description Value
Views
WIDS view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
In a brute force key cracking attack, an attacker tries all possible key combinations
one by one to obtain the correct password. To improve password security, enable
defense against brute force key cracking to prolong the time used to crack
passwords.
An AP checks whether the number of key negotiation failures during WPA/WPA2-
PSK, WAPI-PSK, or WEP-Share-Key authentication of a user exceeds the threshold
configured using the brute-force-detect threshold command. If so, the AP
considers that the user is using the brute force method to crack the password. If
the dynamic blacklist function is enabled, the AP adds the user to the dynamic
blacklist and discards all the packets from the user until the dynamic blacklist
entry ages out. If the threshold is set to a small value, the AP may incorrectly add
authorized users to the dynamic blacklist, causing the users unable to go online.
Follow-up Procedure
Run the dynamic-blacklist enable command to enable the dynamic blacklist
function.
Example
# Set the maximum number of key negotiation failures allowed within a brute
force key cracking attack detection period to 60.
<HUAWEI> system-view
[HUAWEI] interface wlan-radio 0/0/1
[HUAWEI-wlan-Radio0/0/1] wids attack detect enable wpa-psk
[HUAWEI-wlan-Radio0/0/1] quit
[HUAWEI] wlan
[HUAWEI-wlan-view] wids
[HUAWEI-wlan-wids] brute-force-detect threshold 60
14.8 contain
Function
The contain command enables containment of rogue and interfering devices
based on the RSSI and number of associated STAs on the devices.
The undo contain command disables containment of rogue and interfering
devices based on the RSSI and number of associated STAs on the devices.
By default, containment of rogue and interfering devices based on the RSSI and
number of associated STAs on the devices is disabled.
Format
contain { min-rssi min-rssi | min-sta-num min-sta-num }
undo contain { min-rssi | min-sta-num }
Parameters
Parameter Description Value
Views
WIDS view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After RSSI-based containment is enabled, if the RSSIs of detected rogue and
interfering devices are no more than the specified minimum RSSI value, the
devices are not contained. They are contained only when their RSSIs exceed the
specified minimum RSSI value.
After containment based on the number of associated STAs is enabled, if the
number of STAs associated with detected rogue and interfering devices is smaller
than the specified minimum value, the devices are not contained. They are
contained only when the number of STAs associated with them reaches the
specified minimum value.
Prerequisites
Detection and containment of rogue and interfering devices have been enabled.
Precautions
Example
# Enable containment of rogue and interfering APs with spoofing SSIDs and set
the number of associated STAs that triggers containment to 5.
<HUAWEI> system-view
[HUAWEI] interface wlan-radio 0/0/1
[HUAWEI-wlan-Radio0/0/1] wids contain enable
[HUAWEI-wlan-Radio0/0/1] quit
[HUAWEI] wlan
[HUAWEI-wlan-view] wids
[HUAWEI-wlan-wids] contain-mode spoof-ssid-ap
[HUAWEI-wlan-wids] contain min-sta-num 5
14.9 contain-mode
Function
The contain-mode command sets the containment mode against rogue or
interference devices.
The undo contain-mode command deletes the containment mode against rogue
or interference devices.
Format
contain-mode { open-ap | spoof-ssid-ap | client [ protect sta-whitelist-profile
profile-name ] | adhoc }
undo contain-mode { open-ap | spoof-ssid-ap | client [ protect ] | adhoc }
Parameters
Parameter Description Value
Views
WIDS view
Default Level
2: Configuration level
Usage Guidelines
Rogue or interference devices pose serious security threats to enterprise networks.
After the containment mode is set against rogue or interference APs, the monitor
AP uses the identity of the rogue or interference AP to broadcast deauthentication
frames to forcibly disconnect STAs. To prevent the STAs from connecting to the
rogue or interference AP again, the monitor AP will periodically and continuously
send deauthentication frames.
After the containment mode is set against rogue STAs, interference STAs or Ad-hoc
devices, the monitor AP uses the MAC address of a rogue device to continuously
send unicast deauthentication frames.
Example
# Counter rogue and interference APs with spoofing SSIDs.
<HUAWEI> system-view
[HUAWEI] interface wlan-radio 0/0/1
[HUAWEI-wlan-Radio0/0/1] wids contain enable
[HUAWEI-wlan-Radio0/0/1] quit
[HUAWEI] wlan
[HUAWEI-wlan-view] wids
[HUAWEI-wlan-wids] contain-mode spoof-ssid-ap
The undo device report-interval command restores the default interval at which
an AP detects incremental wireless device information.
Format
device report-interval interval
Parameters
Parameter Description Value
Views
WIDS view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Prerequisites
The device detection function has been enabled using the wids device detect
enable command for the AP.
Example
# Set the interval at which an AP detects incremental wireless device information
to 120 seconds.
<HUAWEI> system-view
[HUAWEI] interface wlan-radio 0/0/1
[HUAWEI-wlan-Radio0/0/1] wids device detect enable
[HUAWEI-wlan-Radio0/0/1] quit
[HUAWEI] wlan
[HUAWEI-wlan-view] wids
[HUAWEI-wlan-wids] device report-interval 120
Format
dhcp trust port
Parameters
None
Views
GE interface view, Eth-Trunk interface view, , MultiGE interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Example
# Configure GE0/0/0 on the AP as a DHCP trusted interface.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/0
[HUAWEI-GigabitEthernet0/0/0] dhcp trust port
Format
display ap radio-environment [ radio radio-id ]
Parameters
Parameter Description Value
Views
All views
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When WLAN access experience is poor, you can run this command to view air
interface environment information and Wi-Fi interference sources. The interference
can be determined based on the noise floor, signal to interference plus noise ratio
(SINR), co-channel interference, and adjacent-channel interference. After this
command is executed, radio scanning of the AP is automatically enabled, and the
AP starts to scan the air interface environment of radios. You can run this
command again to view air interface environment scanning results.
Precautions
When you run this command for the first time, no air interface environment
scanning result is displayed. To view air interface environment scanning results,
run this command again.
After AP radio scanning is enabled using this command, the air interface
performance of an AP is affected. If this command is not executed again after five
minutes, AP radio scanning is automatically disabled.
If the radio radio-id parameter is not specified, air interface environment
information about all radios of the AP is displayed.
NOTE
In the scanning result, the channel utilization, co-channel interference, and adjacent-channel
interference are calculated with the impact of non-Wi-Fi interference. However, non-Wi-Fi
interference devices are not displayed in the interference source list.
Example
# Display air interface environment information about radio 0.
<HUAWEI> display ap radio-environment radio 0
Warning: This operation will enable scanning for the specified radio, affecting AP's air interface
performance. Scanning will be aut
omatically disabled 5 minutes after you run this command. Continue? [Y/N]y
Info: This operation may take a few seconds. Please wait for a moment.done.
p: permit
i: interference
Ch: Channel
CU: Channel Utility
NF: Noise Floor
CommIf: Common-Channel Interference
AdjaceIf: Adjacent-Channel Interference
SINR: Signal to Interference and Noise Ratio
#AP: Number of APs detected
Radio: 0
ScanChannel: 1
WorkChannel: 1
ScanCycle: 1
---------------------------------------------------------------------------
Ch NF CU(%) CommIf(%) AdjaceIf(%) SINR #APs
---------------------------------------------------------------------------
1 -105 75 19 - 245 57
---------------------------------------------------------------------------
Total: 1
---------------------------------------------------------------------------
Ch MAC Type RSSI SSID
---------------------------------------------------------------------------
1 c88d-833a-8d41 i -65 xw9-2g-tunnel
1 00e0-fc3a-8d41 i -65 xw9-2g-tunnel
Total: 1
Item Description
NF Noise floor.
Item Description
NOTE
If an AP detects that a channel has a high co-channel interference (higher than 50%), another
Wi-Fi device is using this channel and affects the local AP. In this case, it is recommended that
the AP channel be switched using radio calibration or other methods.
Format
display wlan wids manual-contain device-mac-list
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After the manual containment function is enabled, you can run this command to
check the list of MAC addresses of devices to be manually contained.
Example
# Display the list of MAC addresses of devices to be manually contained.
<HUAWEI> display wlan wids manual-contain device-mac-list
--------------------------------------------------------------------------------
Index MAC
--------------------------------------------------------------------------------
0 1211-2222-3331
1 1211-2222-3332
2 1211-2222-3333
3 1211-2222-3334
4 1211-2222-3335
5 1211-2222-3336
6 1211-2222-3337
7 1211-2222-3338
8 1211-2222-3339
--------------------------------------------------------------------------------
Total: 9
Item Description
Format
display wlan ids attack-detected { all | flood | spoof | wapi-psk | weak-iv |
wep-share-key | wpa-psk | wpa2-psk | mac-address mac-address }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
After attack detection is enabled, you can run this command to view information
about the attacking devices.
Prerequisites
The attack detection functions of all types have been enabled using the wids
attack detect enable command.
Example
# Display information of all current attacking devices.
Table 14-3 Description of the display wlan ids attack-detected all command
output
Item Description
Format
display wlan ids attack-detected statistics
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
After attack detection is enabled, you can run the display wlan ids attack-
detected statistics command to view the total number of all types of attacks.
Prerequisites
The attack detection functions of all types have been enabled using the wids
attack detect enable command.
Example
# Display the number of attacks detected.
<HUAWEI> display wlan ids attack-detected statistics
Attack tracking since: 2015-01-27/12:02:11
--------------------------------------------------------------------------------
Type Total
--------------------------------------------------------------------------------
Probe request frame flood attack :0
Authentication request frame flood attack :0
Deauthentication frame flood attack :0
Association request frame flood attack :0
Disassociation request frame flood attack :0
Reassociation request frame flood attack :0
Action frame flood attack :0
EAPOL start frame flood attack :0
EAPOL logoff frame flood attack :0
Weak IVs detected :0
Spoofed deauthentication frame attack :0
Spoofed disassociation frame attack :0
Other types of spoofing frame attack :0
Format
display wlan ids attack-history { all | flood | spoof | wapi-psk | weak-iv | wep-
share-key | wpa-psk | wpa2-psk | mac-address mac-address }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
Prerequisites
The attack detection functions of all types have been enabled using the wids
attack detect enable command.
Example
# Display historical records of all attacking devices.
<HUAWEI> display wlan ids attack-history all
act: Action frame asr: Association request
aur: Authentication request daf: Deauthentication frame
dar: Disassociation request wiv: Weak IV detected
pbr: Probe request rar: Reassociation request
eaps: EAPOL start frame eapl: EAPOL logoff frame
saf: Spoofed disassociation frame
sdf: Spoofed deauthentication frame
otsf: Other types of spoofing frames
AP: Name of the monitor AP that has detected the device
AT: Attack type CH: Channel number
-------------------------------------------------------------------------------
MAC address AT CH RSSI(dBm) Last detected time AP
-------------------------------------------------------------------------------
00e0-fc12-37ec pbr 165 -86 2014-11-20/15:51:43 ap-13
00e0-fc12-171d pbr 165 -88 2014-11-20/15:41:43 ap-13
00e0-fc12-0bf4 pbr 165 -81 2014-11-20/15:41:53 ap-13
-------------------------------------------------------------------------------
Total: 3, printed: 3
Table 14-6 Description of the display wlan ids attack-history all command
output
Item Description
Item Description
Format
display wlan ids contain { all | ap | adhoc | client | ssid | mac-address mac-
address }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After WIDS or WIPS is enabled, you can run the display wlan ids
countermeasures device command to view information about countered devices.
Example
# Display the list of all countered devices.
<HUAWEI> display wlan ids contain all
#Rf: Number of monitor radios that have contained the device
CH: Channel number
Reason: open-encrypt, spoof-ssid-ap, protect-client,
client, adhoc, manual
-------------------------------------------------------------------------------
MAC address CH Authentication Last detected time #Rf Reason SSID
-------------------------------------------------------------------------------
00e0-fc12-3456 11 open 2014-11-20/16:16:57 1 manual -
-------------------------------------------------------------------------------
Total: 1, printed: 1
Table 14-7 Description of the display wlan ids contain all command output
Item Description
CMCC 2 2012-07-27/16:41:55
----------------------------------------------------------------------
Total: 1, printed: 1
Table 14-8 Description of the display wlan ids contain ssid command output
Item Description
Table 14-9 Description of the display wlan ids contain mac-address command
output
Item Description
Item Description
Number of monitor radios that have Number of radios that contain the
contained the device device.
If WIDS is enabled on multiple APs,
the type of the device may be
contained by these APs' radios.
Format
display wlan ids device-detected { all | [ interference | rogue ] ap | [ rogue ]
bridge | [ rogue ] client [ bssid bssid ] | adhoc | [ rogue ] ssid | mac-address
mac-address }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
To ensure the WLAN reliability, all the wireless devices on the current WLAN must
be monitored. You can run the display wlan ids detected command to view
information about the wireless devices detected.
Prerequisites
The device detection function has been enabled on the AP using the wids device
detect enable command.
Example
# Display all devices detected on a WLAN.
<HUAWEI> display wlan ids device-detected all
Flags: r: rogue, p: permit, i: interference, a: adhoc, w: AP, b: wireless-bridge, c: client
#Rf: Number of monitor radios that have detected the device
CH: Channel number
RSSI(dBm): Maximum RSSI of detected device
StaNum: Number of detected STAs associated with the device
-------------------------------------------------------------------------------------------------
MAC address Type CH RSSI(dBm) StaNum Authentication Last detected time #Rf SSID
-------------------------------------------------------------------------------------------------
00e0-fc20-de2b i/w 1 -60 5 open 2014-11-20/11:03:44 1 -
-------------------------------------------------------------------------------------------------
Total: 1, printed: 1
Table 14-10 Description of the display wlan ids device-detected all command
output
Item Description
Item Description
Table 14-11 Description of the display wlan ids device-detected ssid command
output
Item Description
Table 14-12 Description of the display wlan ids device-detected rogue ssid
command output
Item Description
Number of monitor radios that have Number of radios that detect the
detected the device device.
If WIDS is enabled on multiple APs,
the type of the device may be detected
by these APs' radios.
Item Description
Format
display wlan ids device-detected statistics
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display wlan ids device-detected statistics command to view
statistics on all wireless devices detected on a WLAN.
Example
# Display statistics on wireless devices detected on a WLAN.
<HUAWEI> display wlan ids device-detected statistics
------------------------------------------------------------------------------------------------
Rogue Adhoc :0
Contain Adhoc :0
Rogue AP :0
Permit AP :0
Interference AP :0
Contain AP :0
Rogue client :2
Permit client :0
Interference Client : 0
Contain client :2
Permit Bridge :2
Rogue Bridge :0
Interference Bridge : 0
------------------------------------------------------------------------------------------------
Item Description
Item Description
Format
display wlan dynamic-blacklist { all | mac-address mac-address }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
An AP uses attack detection and dynamic blacklist functions to add a detected
attack device to the dynamic blacklist, and rejects packets sent from this device
until the device entry in the dynamic blacklist ages. You can run this command to
view information about devices in the dynamic blacklist.
Example
# Display information about all devices in the dynamic blacklist.
<HUAWEI> display wlan dynamic-blacklist all
#AP: Number of monitor APs that have detected the device
LAT: Left aging time(s)
act: Action frame asr: Association request
aur: Authentication request daf: Deauthentication frame
dar: Disassociation request eapl: EAPOL logoff frame
pbr: Probe request rar: Reassociation request
eaps: EAPOL start frame sti: Static IP
brf: Broadcast flood
-------------------------------------------------------------------------------
MAC address Last detected time Reason #AP LAT
-------------------------------------------------------------------------------
00e0-fc12-3451 2015-07-27/12:51:25 brf 1 100
00e0-fc12-3452 2015-07-27/12:51:25 pbr 1 200
00e0-fc12-3453 2015-07-27/12:51:25 pbr 1 200
00e0-fc12-3454 2015-07-27/12:51:25 sti 1 200
00e0-fc12-3455 2015-07-27/12:51:25 pbr 1 200
00e0-fc12-3456 2015-07-27/12:51:25 pbr 1 200
-------------------------------------------------------------------------------
Total: 6, printed: 6
-------------------------------------------------------------
wcw 2015-07-27/12:51:25 pbr 100 900
wcw2 2015-07-27/12:51:25 pbr 100 1900
-------------------------------------------------------------
Total: 2, printed: 2
Item Description
Format
display wlan ids rogue-history { all | ap | bridge | client | adhoc | ssid | mac-
address mac-address }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
You can run the display wlan ids rogue-history command to view the historical
records of rogue devices.
Prerequisites
The device detection function has been enabled on the AP using the wids device
detect enable command.
Example
# Display historical records of all rogue devices.
<HUAWEI> display wlan ids rogue-history all
Flags: a: adhoc, w: AP, b: wireless-bridge, c: client
CH: Channel number
-------------------------------------------------------------------------------
MAC address Type CH Authentication Last detected time SSID
-------------------------------------------------------------------------------
00e0-fc12-3456 w 11 open 2014-11-20/11:20:37 wlan
00e0-fc12-3457 c 11 - 2014-11-20/11:16:07 -
-------------------------------------------------------------------------------
Total: 2, printed: 2
Table 14-17 Description of the display wlan ids rogue-history all command
output
Item Description
Item Description
Table 14-18 Description of the display wlan ids rogue-history ssid command
output
Item Description
Item Description
Format
display wlan ids spoof-ssid fuzzy-match regex regex-value
Parameters
Parameter Description Value
regex regex- Specifies the matching rules for spoofing The rules must exist.
value SSIDs and displays spoofing SSIDs that The value is in text
match the rules. format and can
contain 1 to 48
case-sensitive
characters. It
supports Chinese
characters or
mixture of Chinese
and English
characters.
NOTE
You can only use a
command editor of
the UTF-8 encoding
format to edit
Chinese characters.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
To view SSIDs that match a specific rule, run the display wlan ids spoof-ssid
fuzzy-match regex regex-value command.
Example
# Display SSIDs that match a specific rule.
<HUAWEI> display wlan ids spoof-ssid fuzzy-match regex ^HUAWE[1l]$
#Dev: Number of devices using SSID
--------------------------------------------------------------------------------
Match SSID #Dev Last detected time WIDS spoof profile
--------------------------------------------------------------------------------
HUAWE1 2 2014-03-06/12:44:37 huawei
HUAWEl 1 2014-03-06/12:44:50 huawei
--------------------------------------------------------------------------------
Total: 2
Table 14-20 Description of the display wlan ids spoof-ssid fuzzy-match regex
command output
Item Description
Format
dynamic-blacklist aging-time time
Parameters
Parameter Description Value
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
When detecting attacks from a STA, an AP forbids the STA to go online, and
rejects any packets sent from the STA. As long as the STA is blacklisted, it cannot
go online again even if it no longer launches attacks. To avoid that, you can run
the dynamic-blacklist aging-time command to configure an aging time for the
dynamic blacklist. If the configured aging time expires and the AP detects no
attack from the STA, the STA is once again allowed to go online.
Example
# Set the aging time of the dynamic blacklist to 200 seconds.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] dynamic-blacklist aging-time 200
Format
dynamic-blacklist enable
undo dynamic-blacklist enable
Parameters
None
Views
WIDS view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Attack detection is enabled to detect flood attacks, weak IV attacks, spoofing
attacks, and brute force key cracking attacks. When detecting attacks initiated by
a device, an AP reports an alarm. In addition, you can run the dynamic-blacklist
enable command to enable the dynamic blacklist function on the AP for handling
flood attacks and brute force key cracking attacks. The AP then automatically adds
the attacking device to a dynamic blacklist and discards packets sent from the
attacking device till the dynamic blacklist ages out.
An AP can use the dynamic blacklist to filter out the blacklisted wireless devices to
avoid malicious attacks.
Follow-up Procedure
Run the dynamic-blacklist aging-time command to set an aging time for the
dynamic blacklist.
Example
# Enable the dynamic blacklist function.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] wids
[HUAWEI-wlan-wids] dynamic-blacklist enable
Format
flood-detect interval interval
undo flood-detect interval
Parameters
Parameter Description Value
Views
WIDS view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
A flood attack occurs when an AP receives a large number of packets of the same
type within a short period. As a result, the AP is flooded by too many attack
packets to process service packets from authorized wireless terminals.
After the flood attack detection function is enabled, an AP counts the number of
packets of the same type that it receives from a user at regular intervals. When
the number exceeds a specified threshold, the AP considers that the user launches
a flood attack. If the dynamic blacklist function is enabled, the user will be added
to a dynamic blacklist.
Follow-up Procedure
Run the dynamic-blacklist enable command to enable the dynamic blacklist
function.
Example
# Set the flood attack detection interval to 120s.
<HUAWEI> system-view
[HUAWEI] interface wlan-radio 0/0/1
[HUAWEI-wlan-Radio0/0/1] wids attack detect enable flood
[HUAWEI-wlan-Radio0/0/1] quit
[HUAWEI] wlan
[HUAWEI-wlan-view] wids
[HUAWEI-wlan-wids] flood-detect interval 120
Format
flood-detect quiet-time quiet-time-value
undo flood-detect quiet-time
Parameters
Parameter Description Value
Views
WIDS view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After attack detection is enabled on an AP, the AP reports alarms upon attack
detection. If an attack source launches attacks repeatedly, a large number of
repeated alarms are generated. To prevent this situation, configure the quiet time
for an AP to report alarms. When detecting attack sources of the same MAC
address, the AP does not report alarms in the quiet time. However, if the AP still
detects attacks from the attack source after the quiet time expires, the AP reports
alarms. You can set the quiet time based on attack types.
To obtain attack information in a timely manner, set the quiet time to a small
value. If attacks are frequently detected, set the quiet time to a large value to
prevent frequent alarm reports.
Follow-up Procedure
Run the dynamic-blacklist enable command to enable the dynamic blacklist
function.
Example
# Set the quiet time to 300 seconds for an AP to record the detected flood attacks.
<HUAWEI> system-view
[HUAWEI] interface wlan-radio 0/0/1
[HUAWEI-wlan-Radio0/0/1] wids attack detect enable flood
[HUAWEI-wlan-Radio0/0/1] quit
[HUAWEI] wlan
[HUAWEI-wlan-view] wids
[HUAWEI-wlan-wids] flood-detect quiet-time 300
Format
flood-detect threshold threshold
undo flood-detect threshold
Parameters
Parameter Description Value
Views
WIDS view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
A flood attack occurs when a device receives a large number of packets of the
same type within a short period. As a result, the device is flooded by too many
attack packets to process service packets from authorized wireless terminals.
After the flood attack detection function is enabled, a device counts the number
of packets of the same type that it receives from a user at regular intervals. When
the number exceeds a specified threshold, the device considers that the user
launches a flood attack. If the dynamic blacklist function is enabled, the user will
be added to a dynamic blacklist. If the threshold is set to a small value, the device
may incorrectly add authorized users to the dynamic blacklist, causing the users
unable to go online.
Follow-up Procedure
Example
# Set the flood attack detection threshold to 350.
<HUAWEI> system-view
[HUAWEI] interface wlan-radio 0/0/1
[HUAWEI-wlan-Radio0/0/1] wids attack detect enable flood
[HUAWEI-wlan-Radio0/0/1] quit
[HUAWEI] wlan
[HUAWEI-wlan-view] wids
[HUAWEI-wlan-wids] flood-detect threshold 350
The undo ip source check user-bind enable command disables IPSG on APs.
Format
ip source check user-bind enable
Parameters
None
Views
VAP profile view
Default Level
2: Configuration level
Usage Guidelines
Users can configure static IP addresses for their clients and connect to the Internet
after passing 802.1X authentication. To defend against source IP address spoofing
attacks, you need to enable IPSG on APs.
Example
# Enable IPSG on APs.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] vap-profile name vap1
[HUAWEI-wlan-vap-prof-vap1] ip source check user-bind enable
Format
learn-client-address dhcp-strict [ blacklist enable ]
undo learn-client-address dhcp-strict
Parameters
Parameter Description Value
Views
VAP profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When a STA associates with an AP, the following situation occurs after strict STA IP
address learning through DHCP is enabled:
● If the STA obtains an IP address through DHCP, the AP will save the IP
address. The STA IP address can be used to maintain the mapping between
STA IP addresses and MAC addresses.
Example
# Enable strict STA IP address learning through DHCP.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] vap-profile name vap1
[HUAWEI-wlan-vap-prof-vap1] learn-client-address dhcp-strict
Format
learn-client-address ipv4 disable
undo learn-client-address ipv4 disable
Parameters
Parameter Description Value
Views
VAP profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Prerequisites
● Before STA address learning is disabled, strict STA IPv4 address learning has
been disabled using the undo learn-client-address dhcp-strict command.
Precautions
Example
# Disable STA IPv4 address learning.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] vap-profile name vap1
[HUAWEI-wlan-vap-prof-vap1] learn-client-address ipv4 disable
14.31 permit-ap
Function
The permit-ap command configures a WIDS whitelist.
Format
permit-ap { mac-address mac-address | oui oui | ssid ssid }
Parameters
Parameter Description Value
Views
WIDS view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After WIDS/WIPS is enabled, rogue APs can be detected and countered. However,
there may be APs of other vendors or other networks working in the existing
signal coverage areas. If these APs are countered, their services will be affected. To
prevent this situation, configure an authorized AP list, including an authorized
MAC address list, OUI list, and SSID list. If an unauthorized AP is detected but
matches the authorized AP list, the AP is considered an authorized AP and will not
be countered.
For example, APs of other vendors are deployed on the existing WLAN to expand
network capacity. To prevent the APs from being countered, add OUIs of the
vendors to a whitelist and add SSIDs of these APs to a whitelist. In this way, the
device will consider the APs as authorized APs.
Precautions
If you add or delete an entry, the device will re-check the validity of the
unauthorized APs. If an unauthorized AP becomes authorized, the device stops
countering the AP. If an authorized AP becomes unauthorized, the device starts
countering the AP.
Example
# Add an MAC address, an OUI, and an SSID to the WIDS whitelist.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] wids
[HUAWEI-wlan-wids] permit-ap mac-address 0011-2233-4455
[HUAWEI-wlan-wids] permit-ap oui 00-11-22
[HUAWEI-wlan-wids] permit-ap ssid huawei
Format
reset wlan ids attack-detected { all | flood | spoof | wapi-psk | weak-iv | wep-
share-key | wpa-psk | wpa2-psk | mac-address mac-address }
Parameters
Parameter Description Value
Views
All views
Default Level
3: Management level
Usage Guidelines
After attack detection is enabled, information about attacking devices detected is
recorded. When there is excessive information recorded or the recorded
information is useless, you can run the reset wlan ids attack-detected command
to delete the information.
Example
# Delete information about all the current attacking devices.
<HUAWEI> reset wlan ids attack-detected all
Format
reset wlan ids attack-detected statistics
Parameters
None
Views
All views
Default Level
3: Management level
Usage Guidelines
After attack detection is enabled, the number of attacks detected is recorded.
When there is excessive information recorded or the recorded information is
useless, you can run the reset wlan ids attack-detected statistics command to
delete the information.
Example
# Delete the number of attacks detected.
<HUAWEI> reset wlan ids attack-detected statistics
Format
reset wlan ids attack-history { all | flood | spoof | wapi-psk | weak-iv | wep-
share-key | wpa-psk | wpa2-psk | mac-address mac-address }
Parameters
Parameter Description Value
Views
All views
Default Level
3: Management level
Usage Guidelines
After attack detection is enabled, historical records about attacking devices
detected are recorded. When there is excessive information recorded or the
recorded information is useless, you can run the reset wlan ids attack-history
command to delete the information.
Example
# Delete historical records about all the current attacking devices.
<HUAWEI> reset wlan ids attack-history all
Format
reset wlan dynamic-blacklist { mac-address mac-address | all }
Parameters
Parameter Description Value
mac-address Deletes the device with a specified MAC The MAC address
mac-address address from the dynamic blacklist. must exist.
Views
All views
Default Level
3: Management level
Usage Guidelines
Usage Scenario
The reset wlan dynamic-blacklist command is applicable to the following
scenarios:
● To re-collect the dynamic blacklist information, run the reset wlan dynamic-
blacklist all command to delete all information in the dynamic blacklist.
After that, the AP re-collects the information.
● To remove an authorized device from the dynamic blacklist, run the reset
wlan dynamic-blacklist mac-address command to remove the MAC address
of the device from the dynamic blacklist. After that, information sent from the
device is not rejected.
Precautions
Running the reset wlan dynamic-blacklist command affects packet receiving of
APs. Exercise caution when running this command.
Example
# Delete the device with the MAC address 00e0-FC12-3456 from the dynamic
blacklist.
<HUAWEI> reset wlan dynamic-blacklist mac-address 00e0-fc12-3456
Format
reset wlan ids rogue-history { all | ap | bridge | client | adhoc | ssid [ ssid ] |
mac-address mac-address }
Parameters
Parameter Description Value
ssid [ ssid ] Deletes historical records of devices with The SSID must exist.
specified SSIDs. To specify an SSID
starting with a
space, include the
SSID with double
quotation marks ("
"). For example, in
the SSID " hello",
the double
quotation marks at
the start and end of
the SSID occupy two
characters. To
specify an SSID
starting with a
double quotation
mark ("), enter an
escape character (\)
before the double
quotation mark. For
example, in the
SSID \"hello, the
escape character (\)
occupies one
character.
Views
All views
Default Level
3: Management level
Usage Guidelines
When there are excessive historical records of rogue devices or their historical
records are useless, you can run the reset wlan ids rogue-history command to
delete the historical records.
Example
# Delete all detected historical records of the rogue devices.
<HUAWEI> reset wlan ids rogue-history all
Format
rogue-device log enable
undo rogue-device log enable
Parameters
None
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If a rogue device is detected after this function is enabled, information about the
device is recorded in the log.
Example
# Enable the function of recording rogue device information in the log.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rogue-device log enable
The undo spoof-detect quiet-time command restores the default quiet time for
an AP to record the detected spoofing attacks.
By default, the quiet time is 600 seconds for an AP to record the detected spoofing
attacks.
Format
spoof-detect quiet-time quiet-time-value
undo spoof-detect quiet-time
Parameters
Parameter Description Value
Views
WIDS view
Default Level
2: Configuration level
Usage Guidelines
After attack detection is enabled on an AP, the AP reports alarms upon attack
detection. If an attack source launches attacks repeatedly, a large number of
repeated alarms are generated. To prevent this situation, configure the quiet time
for an AP to report alarms. When detecting attack sources of the same MAC
address, the AP does not report alarms in the quiet time. However, if the AP still
detects attacks from the attack source after the quiet time expires, the AP reports
alarms. You can set the quiet time based on attack types.
To obtain attack information in a timely manner, set the quiet time to a small
value. If attacks are frequently detected, set the quiet time to a large value to
prevent frequent alarm reports.
Example
# Set the quiet time to 300 seconds for an AP to record the detected spoofing
attacks.
<HUAWEI> system-view
[HUAWEI] interface wlan-radio 0/0/1
[HUAWEI-wlan-Radio0/0/1] wids attack detect enable spoof
[HUAWEI-wlan-Radio0/0/1] quit
[HUAWEI] wlan
[HUAWEI-wlan-view] wids
[HUAWEI-wlan-wids] spoof-detect quiet-time 300
14.39 spoof-ssid
Function
The spoof-ssid command configures a fuzzy matching rule for spoofing SSIDs.
The undo spoof-ssid command deletes a fuzzy matching rule for spoofing SSIDs.
By default, no fuzzy matching rule is configured for spoofing SSIDs.
Format
spoof-ssid fuzzy-match regex regex-value
undo spoof-ssid { fuzzy-match regex regex-value | all }
Parameters
Parameter Description Value
regex regex- Specifies the regular expression for an The value is in text
value SSID. If an SSID matches the regular format and can
expression, the SSID is considered a contain 1 to 48
spoofing SSID. case-sensitive
characters. It
supports Chinese
characters or
mixture of Chinese
and English
characters.
When the regular
expression is used,
you can press Ctrl+T
to enter a question
mark (?). For how
to set the regular
expression, see
"Filtering the
Command Outputs"
in Configuration
Guide.
NOTE
You can only use a
command editor of
the UTF-8 encoding
format to edit
Chinese characters.
Views
WIDS view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
WLAN services are available in public places, such as banks and airports. Users can
connect to the WLANs after associating with corresponding SSIDs. If a rogue AP is
deployed and provides spoofing SSIDs similar to authorized SSIDs, the users may
be misled and connect to the rogue AP, which brings security risks. To address this
problem, configure a fuzzy matching rule to identify spoofing SSIDs. The device
compares a detected SSID with the matching rule. If the SSID matches the rule,
the SSID is considered a spoofing SSID. The AP using the spoofing SSID is a rogue
AP. After rogue AP containment is configured, the device contains the rogue AP
and disconnects users from the spoofing SSID.
Precautions
To make fuzzy matching rules for spoofing SSIDs take effect, enable device
detection and rogue device containment so that the device can take
countermeasures against rogue APs.
To contain all SSIDs except those on the local device, set the fuzzy matching rule
to * and then run the contain-mode command to set the containment mode to
spoof-ssid-ap.
Example
# Configure a fuzzy matching rule using the regular expression ^TES[1l]$ to
identify spoofing SSIDs TEST1 or TESL similar to TEST.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] wids
[HUAWEI-wlan-wids] spoof-ssid fuzzy-match regex ^TES[1l]$
By default, an AP does not send ARP/ND proxy packets for a STA before the STA is
successfully associated.
Format
sta arp-nd-proxy before-assoc
undo sta arp-nd-proxy before-assoc
Parameters
None
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If an AP is enabled to send ARP/ND proxy packets for a STA before the STA
succeeds in authentication or key negotiation, the Layer 2 switch connected to the
AP will learn the MAC address of the STA. If an attack floods thousands of STA
MAC addresses, the MAC address table on the switch will be seriously corrupted,
bringing security risks. To avoid this issue, you can run the undo sta arp-nd-proxy
before-assoc command to configure the AP to send ARP/ND proxy packets for a
STA after the STA succeeds in authentication or key negotiation.
In scenarios with low security requirements, you can run the sta arp-nd-proxy
before-assoc command to configure the AP to send ARP/ND proxy packets for a
STA before the STA is successfully associated to improve link update efficiency.
Precautions
After the undo sta arp-nd-proxy before-assoc command is run on an AP, the AP
does not send ARP/ND proxy packets for a STA that goes online in open or WEP
mode.
Example
# Configure an AP to send ARP/ND proxy packets for a STA before the STA is
successfully associated.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] sta arp-nd-proxy before-assoc
The undo weak-iv-detect quiet-time command restores the default quiet time
for an AP to record the detected weak IV attacks.
By default, the quiet time is 600 seconds for an AP to record the detected weak IV
attacks.
Format
weak-iv-detect quiet-time quiet-time-value
undo weak-iv-detect quiet-time
Parameters
Parameter Description Value
Views
WIDS view
Default Level
2: Configuration level
Usage Guidelines
After attack detection is enabled on an AP, the AP reports alarms upon attack
detection. If an attack source launches attacks repeatedly, a large number of
repeated alarms are generated. To prevent this situation, configure the quiet time
for an AP to report alarms. When detecting attack sources of the same MAC
address, the AP does not report alarms in the quiet time. However, if the AP still
detects attacks from the attack source after the quiet time expires, the AP reports
alarms. You can set the quiet time based on attack types.
To obtain attack information in a timely manner, set the quiet time to a small
value. If attacks are frequently detected, set the quiet time to a large value to
prevent frequent alarm reports.
Example
# Set the quiet time to 300 seconds for an AP to record the detected weak IV
attacks.
<HUAWEI> system-view
[HUAWEI] interface wlan-radio 0/0/1
[HUAWEI-wlan-Radio0/0/1] wids attack detect enable weak-iv
[HUAWEI-wlan-Radio0/0/1] quit
[HUAWEI] wlan
[HUAWEI-wlan-view] wids
[HUAWEI-wlan-wids] weak-iv-detect quiet-time 300
14.42 wids
Function
The wids command displays the WIDS view.
Format
wids
Parameters
None
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
To perform WIDS configurations, run the wids command to enter the WIDS view.
All WIDS configuration commands need to be run in the WIDS view.
Example
# Display the WIDS view.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] wids
[HUAWEI-wlan-wids]
Format
wids attack detect enable { all | flood | weak-iv | spoof | wpa-psk | wpa2-psk |
wapi-psk | wep-share-key }
undo wids attack detect enable { all | flood | weak-iv | spoof | wpa-psk | wpa2-
psk | wapi-psk | wep-share-key }
Parameters
Parameter Description Value
Views
Radio interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
increase the time required for password cracking and improve password
security.
Follow-up Procedure
Example
# Enable brute force attack detection for WPA-PSK authentication on radio 0.
<HUAWEI> system-view
[HUAWEI] interface wlan-radio 0/0/0
[HUAWEI-wlan-Radio0/0/0] wids attack detect enable wpa-psk
The undo wids contain enable command disables rogue or interference device
containment on an AP radio.
Format
wids contain enable
Parameters
None
Views
Radio interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After the containment mode is set against rogue or interference APs, the monitor
AP uses the identity of the rogue or interference AP to broadcast deauthentication
frames to forcibly disconnect STAs. To prevent the STAs from connecting to the
After the containment mode is set against rogue or interference STAs or ad-hoc
devices, the monitor AP uses the MAC address of a rogue or interference device to
continuously send unicast deauthentication frames.
Follow-up Procedure
Example
# Enable rogue or interference device containment on radio 0.
<HUAWEI> system-view
[HUAWEI] interface wlan-radio 0/0/0
[HUAWEI-wlan-Radio0/0/0] wids contain enable
The undo wids device detect enable command disables device detection on an
AP radio.
Format
wids device detect enable
Parameters
None
Views
Radio interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After the wireless device detection function is enabled, the monitoring AP detects
information about wireless devices in its coverage range. The AP determines
whether unauthorized devices exist on the WLAN.
Example
# Enable device detection on radio 0.
<HUAWEI> system-view
[HUAWEI] interface wlan-radio 0/0/0
[HUAWEI-wlan-Radio0/0/0] wids device detect enable
Format
wids manual-contain device-mac device-mac
undo wids manual-contain { all | device-mac device-mac }
Parameters
Parameter Description Value
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can run the wids manual-contain command in the WLAN view to manually
contain a specified device in a complicated environment.
Precautions
Wireless bridges are not contained.
Example
# Contain the AP with the MAC address of 0004-0004-0004.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] wids manual-contain device-mac 0004-0004-0004
14.47 work-mode
Function
The work-mode command sets the radio working mode in the radio profile view.
The undo work-mode command restores the default radio working mode.
By default, AP radios work in normal mode.
Format
work-mode { monitor | normal }
undo work-mode
Parameters
Parameter Description Value
Views
Radio interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
An AP can work in two modes:
● normal: indicates the normal mode.
– If air scan functions (such as WIDS and terminal location) are disabled on
a radio, the radio is used to transmit common WLAN services.
Example
# Set the working mode of radio 0 to monitor.
<HUAWEI> system-view
[HUAWEI] interface wlan-radio 0/0/0
[HUAWEI-wlan-Radio0/0/0] work-mode monitor
Warning: Modify the work mode may cause business interruption, continue?[y/n]
:y