No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

MIB Reference

AR100-S, AR110-S, AR120-S, AR150-S, AR160-S, AR200-S, AR1200-S, AR2200-S, and AR3200-S V200R009

Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
hwWlanWidsAttackDetorTable

hwWlanWidsAttackDetorTable

This table describes attack detection information about the monitoring AP.

The indexes of this table are hwWlanWidsAttackDetorDevMac and hwWlanWidsAttackDetorApMac.

OID

Object Name

Syntax

Max Access

Description

Implemented Specifications

1.3.6.1.4.1.2011.6.139.15.9.5.1.1

hwWlanWidsAttackDetorDevMac

MacAddress

not-accessible

This object indicates the MAC address of the detected attack device.

This object is implemented as defined in the corresponding MIB file.

1.3.6.1.4.1.2011.6.139.15.9.5.1.2

hwWlanWidsAttackDetorApMac

MacAddress

not-accessible

This object indicates the MAC address of the monitor AP.

This object is implemented as defined in the corresponding MIB file.

1.3.6.1.4.1.2011.6.139.15.9.5.1.3

hwWlanWidsAttackDetorApName

OCTET STRING(1–31)

read-only

This object indicates the name of the monitor AP.

This object is implemented as defined in the corresponding MIB file.

1.3.6.1.4.1.2011.6.139.15.9.5.1.4

hwWlanWidsAttackDetorAttTypeBmp

Unsigned32

read-only

This object indicates the attack type bitmap.

  • bit0: weakiv
  • bit1: spoof
  • bit2: flood attack
  • bit3: wpa psk attack
  • bit4: wpa2 psk attack
  • bit5: wapi psk attack
  • bit6: wep share-key attack

This object is implemented as defined in the corresponding MIB file.

1.3.6.1.4.1.2011.6.139.15.9.5.1.5

hwWlanWidsAttackDetorPacketBmpFlood

Unsigned32

read-only

This object indicates the flood attack packet bitmap.

  • bit1: disassociation
  • bit2: association request
  • bit3: association response
  • bit4: reassociation request
  • bit5: reassociation response
  • bit6: probe request
  • bit8: authen
  • bit9: deauthen
  • bit10: null data
  • bit11: action
  • bit12: eapol start
  • bit13: eapol logoff
  • bit14: null qos

This object is implemented as defined in the corresponding MIB file.

1.3.6.1.4.1.2011.6.139.15.9.5.1.6

hwWlanWidsAttackDetorPacketBmpSpoof

Unsigned32

read-only

This object indicates the spoofing attack packet bitmap.

  • bit1: disassociation
  • bit9: deauthen
  • bit16: other types of spoofing frames

This object is implemented as defined in the corresponding MIB file.

1.3.6.1.4.1.2011.6.139.15.9.5.1.7

hwWlanWidsAttackDetorFirstDetTimeFlood

Unsigned32

read-only

This object indicates the first time when a flood attack is detected.

This object is implemented as defined in the corresponding MIB file.

1.3.6.1.4.1.2011.6.139.15.9.5.1.8

hwWlanWidsAttackhwWlanWidsAttackDetorFirstDetTimeSpoof

Unsigned32

read-only

This object indicates the first time when a spoofing attack is detected.

This object is implemented as defined in the corresponding MIB file.

1.3.6.1.4.1.2011.6.139.15.9.5.1.9

hwWlanWidsAttackDetorFirstDetTimeWeakIv

Unsigned32

read-only

This object indicates the first time when a Weak IV attack is detected.

This object is implemented as defined in the corresponding MIB file.

1.3.6.1.4.1.2011.6.139.15.9.5.1.10

hwWlanWidsAttackDetorFirstDetTimeWep

Unsigned32

read-only

This object indicates the first time when a WEP attack is detected.

This object is implemented as defined in the corresponding MIB file.

1.3.6.1.4.1.2011.6.139.15.9.5.1.11

hwWlanWidsAttackDetorFirstDetTimeWpa

Unsigned32

read-only

This object indicates the first time when a WPA attack is detected.

This object is implemented as defined in the corresponding MIB file.

1.3.6.1.4.1.2011.6.139.15.9.5.1.12

hwWlanWidsAttackDetorFirstDetTimeWpa2

Unsigned32

read-only

This object indicates the first time when a WPA2 attack is detected.

This object is implemented as defined in the corresponding MIB file.

1.3.6.1.4.1.2011.6.139.15.9.5.1.13

hwWlanWidsAttackDetorFirstDetTimeWapi

Unsigned32

read-only

This object indicates the first time when a WAPI attack is detected.

This object is implemented as defined in the corresponding MIB file.

1.3.6.1.4.1.2011.6.139.15.9.5.1.14

hwWlanWidsAttackDetorRSSI

Integer32

read-only

This object indicates the RSSI of the device that implements the wireless attack detection.

This object is implemented as defined in the corresponding MIB file.

1.3.6.1.4.1.2011.6.139.15.9.5.1.15

hwWlanWidsAttackDetorChannel

Integer32

read-only

This object indicates the channel of the device that implements the wireless attack detection.

This object is implemented as defined in the corresponding MIB file.

1.3.6.1.4.1.2011.6.139.15.9.5.1.16

hwWlanWidsAttackDetorLastDetTime

Unsigned32

read-only

This object indicates the last time when the device detects the attack.

This object is implemented as defined in the corresponding MIB file.

Creation Restriction

No entry can be created in this table.

Modification Restriction

The entries in this table cannot be modified.

Deletion Restriction

The entries in this table cannot be deleted.

Access Restriction

The entries in this table can be read without restriction.

Translation
Download
Updated: 2019-07-19

Document ID: EDOC1000174090

Views: 484200

Downloads: 48

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next