beautypg.com

Displaying and maintaining rogue detection – H3C Technologies H3C WX3000E Series Wireless Switches User Manual

Page 156

background image

144

all rogue devices, only rogue APs, or only ad hoc clients. Countermeasures are not taken against wireless

bridges even if they are classified as rogues.
To configure the countermeasures mode:

Step Command

Remarks

1.

Enter system view.

system-view

N/A

2.

Enter WLAN IDS view.

wlan ids

N/A

3.

Configure the

countermeasures mode.

countermeasures mode { all |
{ rogue | adhoc | config } * }

Optional.
By default, the countermeasure

mode is config, or, the static attack
list.

4.

Enable the countermeasures
function.

countermeasures enable

Disabled by default.
If you want to configure the
countermeasures mode as config,

you need to use the device attack

mac-address command to
configure the static attack list first.

Displaying and maintaining rogue detection

Task Command

Remarks

Display attack list information.

display wlan ids attack-list { config |
all | ap ap-name } [ | { begin |
exclude | include }

regular-expression ]

Available in any view

Display detected entities.

display wlan ids detected { all | rogue
{ ap | client } | adhoc | ssid |

mac-address mac-address } [ | { begin
| exclude | include }

regular-expression ]

Available in any view

Display the history of attacks
detected in the WLAN system.

display wlan ids rogue-history [ |
{ begin | exclude | include }

regular-expression ]

Available in any view

Display the list of permitted
MAC addresses, the list of
permitted SSIDs, or the list of

permitted vendor OUIs..

display wlan ids permitted
{ mac-address | ssid | vendor } [ |

{ begin | exclude | include }
regular-expression ]

Available in any view

Clear the list of detected entities
in WLAN.

reset wlan ids detected { all | rogue
{ ap | client } | adhoc | ssid |

mac-address mac-address }

Available in user view

Clear all entries from the
rogue-history list.

reset wlan ids rogue-history

Available in user view