No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

Configuration Guide - WLAN-AC

S5700 and S6720 V200R012C00

This document describes the configurations of WLAN, including WLAN Service Configuration, Radio Resource Management, Roaming, WLAN QoS, WLAN Security, WDS, Mesh, Location, Hotspot 2.0, Dual-Link Cold Backup, N+1 Backup.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Clearing WLAN Security Information

Clearing WLAN Security Information

Context

After the WLAN security configuration is complete, check the configuration results. If the configuration results are unnecessary or you need to re-collect the configuration results, clear the existing configuration results.

Procedure

  • Run the reset wlan ids attack-detected { all | flood | spoof | wapi-psk | weak-iv | wep-share-key | wpa-psk | wpa2-psk | mac-address mac-address } command to clear information about the detected attacking devices.
  • Run the reset wlan ids attack-detected statistics command to clear statistics on the detected attacks.
  • Run the reset wlan ids attack-history { all | flood | spoof | wapi-psk | weak-iv | wep-share-key | wpa-psk | wpa2-psk | mac-address mac-address } command to clear historical records of the detected attacking devices.
  • Run the reset wlan ids device-detected { all | [ interference | rogue ] ap | [ rogue ] bridge | [ rogue ] client | adhoc | ssid [ ssid ] | mac-address mac-address } command to clear the detected WLAN device list.
  • Run the { ap-id ap-id | ap-name ap-name | mac-address mac-address | all } command to clear information in the dynamic blacklist.
  • Run the reset wlan ids rogue-history { all | ap | bridge | client | adhoc | ssid [ ssid ] | mac-address mac-address } command to clear historical records of the detected rogue devices.
Translation
Download
Updated: 2018-12-24

Document ID: EDOC1100038361

Views: 161157

Downloads: 445

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next