brute-force-detect quiet-time
Function
The brute-force-detect quiet-time command sets the quiet time for an AP to record brute force key attacks.
The undo brute-force-detect quiet-time command restores the default quiet time for an AP to record brute force key attacks.
By default, the quiet time for an AP to record brute force key attacks is 600 seconds.
Usage Guidelines
Usage Scenario
After attack detection is enabled on an AP, the AP reports alarms upon attack detection. If an attack source launches attacks repeatedly, a large number of repeated alarms are generated. To prevent this situation, configure the quiet time function for attack detection. When detecting attack sources of the same MAC address, the AP does not report alarms in the quiet time. However, if the AP still detects attacks from the attack source after the quiet time expires, the AP reports alarms. You can set the quiet time based on attack types.
To obtain attack information in time, set the quiet time to a small value. If attacks are frequently detected, set the quiet time to a large value to avoid frequent alarm reports.
Follow-up Procedure
Run the dynamic-blacklist enable command to enable the dynamic blacklist function.
Example
# Set the quiet time for an AP to record brute force key attacks to 300 seconds.
<Huawei> system-view [Huawei] interface wlan-radio 0/0/1 [Huawei-wlan-Radio0/0/1] wids attack detect enable wpa-psk [Huawei-wlan-Radio0/0/1] quit [Huawei] wlan [Huawei-wlan-view] wids [Huawei-wlan-wids] brute-force-detect quiet-time 300