No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

Web-based Configuration Guide

S7700 and S9700 V200R011C10

This document describes the configuration and maintenance of device through the web network management system. The web network management system provides the functions of viewing device information and managing the entire system, interfaces, services, ACL, QoS, routes, security, and tools.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
WIDS

WIDS

Procedure

  • View device detection results.
    1. Choose Monitoring > Wireless Service > WIDS. The WIDS page is displayed.
    2. View device detection results in Device Detection. Table 4-14 describes the device detection parameters.



      Table 4-14  Device detection parameters

      Parameter

      Description

      Unauthorized device

      Number of unauthorized devices.

      Interference source

      Number of interference sources.

      Authorized device

      Number of authorized devices.

      Countermeasure list

      Number of countered devices.

    3. Click a number in the detection result list.

      The detected device information is displayed in Device Detection Information. Table 4-15 describes the parameters.



      Table 4-15  Device detection parameters

      Parameter

      Description

      MAC Address

      MAC address of the device.

      Device Model

      -

      SSID

      SSID of the device.

      Channel

      Channel used by the device.

      Number of Detected APs

      Number of APs that detect the device.

      Discovered At

      Time when the device is detected.

    4. Select a device in the detected device list and click View Discovered APs. Information about the APs that detect the device is displayed. Table 4-16 describes the parameters.



      Table 4-16  Parameters of APs that detect the device

      Parameter

      Description

      AP ID

      ID of the AP that detects the device.

      AP Name

      Name of the AP that detects the device.

      MAC Address

      MAC address of the AP that detects the device.

      AP Group

      AP group to which the AP that detects the device belongs.

      IP Address

      IP address of the AP that detects the device.

      RSSI of Detected Device

      RSSI of the detected device.

    5. In the list of APs that detect the device, select an AP and click View Whitelist to check the WIDS whitelist of the AP.
  • Clear device detection statistics.
    1. Choose Monitoring > Wireless Service > WIDS. The WIDS page is displayed.
    2. Click Clear in Device Detection.
  • View attack detection results.
    1. Choose Monitoring > Wireless Service > WIDS. The WIDS page is displayed.
    2. View attack detection results in Attack Detection. Table 4-17 describes the attack detection parameters.



      Table 4-17  Attack detection parameters

      Parameter

      Description

      Flood attack

      Number of flood attacks, including the following types of attacks:

      • Flood attack of probe request frames
      • Flood attack of authentication request frames
      • Flood attack of deauthentication request frames
      • Flood attack of association request frames
      • Flood attack of disassociation request frames
      • Flood attack of reassociation request frames
      • Flood attack of action frames
      • Flood attack of EAPOL authentication request frames
      • Flood attack of EAPOL offline frames

      Weak IV attack

      Number of weak IV attacks.

      Spoofing attack

      Number of spoofing attacks, including the following types of attacks:

      • Attack of spoofing deauthentication frames
      • Attack of spoofing disassociation frames
      • Other types of spoofing frames

      Brute force cracking

      Number of brute force cracking attacks, including the following types of attacks:

      • Brute force cracking attack in WEP-SK authentication mode
      • Brute force cracking attack in WPA-PSK authentication mode
      • Brute force cracking attack in WPA2-PSK authentication mode
      • Brute force cracking attack in WAPI authentication mode

    3. Click a number in the attack detection result list to view details. Table 4-18 describes the parameters.



      Table 4-18  Attack detection parameters

      Parameter

      Description

      MAC Address

      MAC address of the attacking device.

      Channel

      Channel used by the attacking device.

      RSSI

      RSSI of the attacking device.

      Monitor AP

      Name of the AP that detects attacks.

      First DetectionTime

      Time when attacks are detected.

      NOTE:

      By default, information about the active attacks is displayed. You can click Historical Attack to check historical attack detection records.

    4. Click View Dynamic Blacklist. The View Dynamic Blacklist page is displayed. Table 4-19 describes the dynamic blacklist parameters.



      Table 4-19  Dynamic blacklist parameters

      Parameter

      Description

      MAC Address

      MAC address of the attacking device.

      Attack Type

      Type of attacks detected.

      Monitor AP

      Name of the AP that detects attacks.

  • Clear attack detection statistics.
    1. Choose Monitoring > Wireless Service > WIDS. The WIDS page is displayed.
    2. Click Clear in Attack Detection.
Translation
Download
Updated: 2019-10-17

Document ID: EDOC1000178323

Views: 83753

Downloads: 112

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next