No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search


To have a better experience, please upgrade your IE browser.


Fat AP and Cloud AP V200R010C00 Command Reference

Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
brute-force-detect interval

brute-force-detect interval


The brute-force-detect interval command sets the interval for brute force key cracking detection.

The undo brute-force-detect interval command restores the default interval for brute force key cracking detection.

By default, the interval for brute force key cracking detection is 60 seconds.


brute-force-detect interval interval

undo brute-force-detect interval





interval interval

Specifies the interval for brute force key cracking detection.

The value is an integer that ranges from 10 to 120, in seconds.


WIDS profile view

Default Level

2: Configuration level

Usage Guidelines

Usage Scenario

In a brute force key cracking attack, an attacker tries all possible key combinations one by one to obtain the correct password. To improve password security, enable defense against brute force key cracking to prolong the time used to crack passwords.

An RU checks whether the number of key negotiation failures during WPA/WPA2-PSK, WAPI-PSK, or WEP-Share-Key authentication of a user exceeds the threshold configured using the brute-force-detect threshold command. If so, the RU considers that the user is using the brute force method to crack the password and reports an alarm to the central AP. If the dynamic blacklist function is enabled, the RU adds the user to the dynamic blacklist and discards all the packets from the user until the dynamic blacklist entry ages out.

Follow-up Procedure

Run the dynamic-blacklist enable command to enable the dynamic blacklist function.


# Set the interval for brute force key cracking detection to 100 seconds.

<Huawei> system-view
[Huawei] wlan
[Huawei-wlan-view] ap-group name office
[Huawei-wlan-ap-group-office] radio 0
[Huawei-wlan-group-radio-office/0] wids attack detect enable wpa-psk
[Huawei-wlan-group-radio-office/0] quit
[Huawei-wlan-ap-group-office] quit
[Huawei-wlan-view] wids-profile name huawei
[Huawei-wlan-wids-prof-huawei] brute-force-detect interval 100
Updated: 2019-11-21

Document ID: EDOC1100064352

Views: 198558

Downloads: 122

Average rating:
This Document Applies to these Products
Related Version
Related Documents
Previous Next