No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

Fat AP and Cloud AP V200R010C00 Command Reference

Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
display wlan ids attack-detected statistics

display wlan ids attack-detected statistics

Function

The display wlan ids attack-detected statistics command displays the number of attacks detected.

Format

display wlan ids attack-detected statistics

Parameters

None

Views

All views

Default Level

1: Monitoring level

Usage Guidelines

Usage Scenario

After attack detection is enabled, you can run the display wlan ids attack-detected statistics command to view the total number of all types of attacks.

Prerequisites

The attack detection functions of all types have been enabled using the wids attack detect enable command.

Example

# Display the number of attacks detected.

<Huawei> display wlan ids attack-detected statistics
Attack tracking since: 2015-01-27/12:02:11
--------------------------------------------------------------------------------
Type                                                  Total
--------------------------------------------------------------------------------
Probe request frame flood attack                    : 0
Authentication request frame flood attack           : 0
Deauthentication frame flood attack                 : 0
Association request frame flood attack              : 0
Disassociation request frame flood attack           : 0
Reassociation request frame flood attack            : 0
Action frame flood attack                           : 0
EAPOL start frame flood attack                      : 0
EAPOL logoff frame flood attack                     : 0
Weak IVs detected                                   : 0
Spoofed deauthentication frame attack               : 0
Spoofed disassociation frame attack                 : 0
Other types of spoofing frame attack                : 0
WEP share-key attack                                : 0
WPA attack                                          : 0
WPA2 attack                                         : 0
WAPI attack                                         : 0
--------------------------------------------------------------------------------
Table 13-13  Description of the display wlan ids attack-detected statistics command output
Item Description

Type

Attack type:
  • Probe request frame flood attack
  • Authentication request frame flood attack
  • Deauthentication frame flood attack
  • Association request frame flood attack
  • Disassociation request frame flood attack
  • Reassociation request frame flood attack
  • Action frame flood attack
  • EAPOL start frame flood attack
  • EAPOL logoff frame flood attack
  • Weak IVs detected
  • Spoofed deauthentication frame attack
  • Spoofed disassociation frame attack
  • Other types of spoofing frame attack
  • WEP share-key attack: brute force cracking attack in WEP-SK authentication mode
  • WPA attack: brute force cracking attack in WPA-PSK authentication mode
  • WPA2 attack: brute force cracking attack in WPA2-PSK authentication mode
  • WAPI attack: brute force cracking attack in WAPI authentication mode

Total

Total number of attacks detected.

Translation
Download
Updated: 2019-11-21

Document ID: EDOC1100064352

Views: 203007

Downloads: 122

Average rating:
This Document Applies to these Products
Related Version
Related Documents
Share
Previous Next