No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

S12700 V200R013C00 Command Reference

This document describes all the configuration commands of the device, including the command function, syntax, parameters, views, default level, usage guidelines, examples, and related commands.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
display wids-profile

display wids-profile

Function

The display wids-profile command displays information about a WIDS profile.

Format

display wids-profile { all | name profile-name }

Parameters

Parameter Description Value
all

Displays information about all WIDS profiles.

-

name profile-name

Displays information about a specified WIDS profile.

The WIDS profile must already exist.

Views

All views

Default Level

1: Monitoring level

Usage Guidelines

You can run the display wids-profile command to view information about a WIDS profile.

Example

# Display information about all WIDS profiles.

<HUAWEI> display wids-profile all
------------------------------------------------------------
Profile name                   Reference
------------------------------------------------------------
default                            3
huawei                             2
office                             0
office01                           0
------------------------------------------------------------
Total: 4
Table 11-175  Description of the display wids-profile all command output
Item Description

Profile name

Name of a WIDS profile.

Reference

Number of times a WIDS profile is referenced.

# Display information about the WIDS profile huawei.

<HUAWEI> display wids-profile name huawei
------------------------------------------------------------
Device report interval(s)            : 10
Brute force detect interval(s)       : 20
Brute force detect threshold         : 20
Brute force quiet time(s)            : 600
Flood detect interval(s)             : 10
Flood detect threshold               : 1
Flood quiet time(s)                  : 600
Weak IV quiet time(s)                : 600
Spoof quiet time(s)                  : 600
Dynamic blacklist                    : enable
Contain rogue mode                   : spoof SSID AP
                                       open-authentication rogue AP
                                       client
                                       client protect
                                       Ad hoc
STA whitelist profile                : STA_whitelist        
WIDS spoof profile                   : huawei
WIDS whitelist profile               : huawei
------------------------------------------------------------
Table 11-176  Description of the display wids-profile name command output

Item

Description

Device report interval(s)

Interval at which an AP reports the detected incremental wireless device information.

To set the interval, run the device report-interval command.

Brute force detect interval(s)

Interval for brute force key cracking detection.

To set the interval, run the brute-force-detect interval command.

Brute force detect threshold

Maximum number of key negotiation failures allowed within a brute force key cracking detection period.

To set the maximum number, run the brute-force-detect threshold command.

Brute force quiet time(s)

Quiet time for an AP to report the detected brute force attacks to the AC.

To set the quiet time, run the brute-force-detect quiet-time command.

Flood detect interval(s)

Flood attack detection interval.

To set the interval, run the flood-detect interval command.

Flood detect threshold

Flood attack detection threshold.

To set the threshold, run the flood-detect threshold command.

Flood quiet time(s)

Quiet time for an AP to report the detected flood attacks to the AC.

To set the quiet time, run the flood-detect quiet-time command.

Weak IV quiet time(s)

Quiet time for an AP to report the detected weak IV attacks to the AC.

To set the quiet time, run the weak-iv-detect quiet-time command.

Spoof quiet time(s)

Quiet time for an AP to report the detected spoofing attacks to the AC.

To set the quiet time, run the spoof-detect quiet-time command.

Dynamic blacklist

Whether the dynamic blacklist function is enabled.

To configure the function, run the dynamic-blacklist enable command.

Contain rogue mode

Countering mode against rogue devices.

To set the countering mode, run the contain-mode command.

STA whitelist profile

STA protection based on a STA whitelist.

To set the countering mode, run the contain-mode command.

WIDS spoof profile

WIDS spoof profile bound to the WIDS profile.

To bind a WIDS spoof profile to a WIDS profile, run the wids-spoof-profile (WIDS profile view) command.

WIDS whitelist profile

WIDS whitelist profile bound to the WIDS profile.

To bind a WIDS whitelist profile to a WIDS profile, run the wids-whitelist-profile (WIDS profile view) command.

Translation
Download
Updated: 2019-04-09

Document ID: EDOC1100065659

Views: 114120

Downloads: 83

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next