wids attack detect enable
Function
(AP group radio view) The wids attack detect enable command enables attack detection on all specified radios in an AP group.
(AP group radio view) The undo wids attack detect enable command disables attack detection on all specified radios in an AP group.
(AP radio view) The wids attack detect enable command enables attack detection on an AP radio.
(AP radio view) The undo wids attack detect enable command cancels the configuration of the attack detection function on an AP radio. The status of this function on the AP radio is then determined by the status of this function in the AP group radio view.
Format
wids attack detect enable { all | flood | weak-iv | spoof | wpa-psk | wpa2-psk | wapi-psk | wep-share-key }
undo wids attack detect enable { all | flood | weak-iv | spoof | wpa-psk | wpa2-psk | wapi-psk | wep-share-key }
Parameters
Parameter |
Description |
Value |
---|---|---|
all |
Enables all attack detection functions. |
- |
flood |
Enables flood attack detection. |
- |
weak-iv |
Enables weak IV attack detection. |
- |
spoof |
Enables spoofing attack detection. |
- |
wpa-psk |
Enables brute force attack detection for WPA-PSK authentication. |
- |
wpa2-psk |
Enables brute force attack detection for WPA2-PSK authentication. |
- |
wapi-psk |
Enables brute force attack detection for WAPI-PSK authentication. |
- |
wep-share-key |
Enables brute force attack detection for shared key authentication. |
- |
Usage Guidelines
Usage Scenario
- flood: indicates flood attack detection used to detect whether an AP receives a large number of packets of the same type in a short period.
- weak-iv: indicates weak IV attack detection used to detect whether weak IV is used for WEP encryption on a WLAN.
- spoof: indicates spoofing attack detection used to detect whether a potential attacker pretends to be an AP to broadcast Deauthentication and Disassociation packets.
- wpa-psk, wpa2-psk, wapi-psk, wep-share-key: indicates brute force attack detection. If the WPA-PSK, WPA2-PSK, WAPI-PSK, or WEP-SK security policy is configured on a WLAN, brute force attack detection can be enabled to increase the time required for password cracking and improve password security.
Precautions
The configuration in the AP radio view has a higher priority than that in the AP group radio view.
- If no attack detection function is enabled in the AP radio view, the configuration in the AP group radio view is inherited. If any attack detection function is enabled in the AP radio view, the configuration in the AP group radio view does not take
effect and the configuration in the AP radio view is inherited. For example, when all attack detection functions are enabled in the AP group radio view:
- If no attack detection function is enabled in the AP radio view, the configuration in the AP group radio view takes effect. That is, all attack detection functions are enabled on the AP radio.
- If spoofing attack detection is enabled in the AP radio view, the configuration in the AP radio view takes effect. That is, only spoofing attack detection is enabled on the AP radio.
Follow-up Procedure
Run the dynamic-blacklist enable command to enable the dynamic blacklist function.