华为配置攻击检测功能示例

配置攻击检测功能示例

组网图形

图1 配置攻击检测功能示例组网图
  • 业务需求
  • 组网需求
  • 数据规划
  • 配置思路
  • 配置注意事项
  • 操作步骤
  • 配置文件
业务需求

企业用户通过WLAN接入网络,以满足移动办公的最基本需求。且在覆盖区域内移动发生漫游时,不影响用户的业务使用。

为了保障网络的稳定和安全,预防泛洪攻击和暴力破解PSK密钥攻击,可以配置攻击检测和动态黑名单。通过将检测到的攻击设备加入动态黑名单,丢弃攻击设备的报文,阻止攻击行为。

组网需求
  • AC组网方式:旁挂二层组网。
  • DHCP部署方式:
    • AC作为DHCP服务器为AP分配IP地址。
    • 汇聚交换机SwitchB作为DHCP服务器为STA分配IP地址。
  • 业务数据转发方式:隧道转发。
配置思路
  1. 配置WLAN基本业务,保证用户能够连接到无线网络。

  2. 配置WPA2-PSK认证方式的防暴力破解密钥攻击检测和泛洪攻击检测功能,使WLAN设备可以检测到发起此类攻击的设备信息。

  3. 配置动态黑名单功能,将攻击设备加入动态黑名单,在配置的老化时间内,拒绝接收其发送的报文。

配置注意事项
操作步骤
  1. 配置周边设备

    # 配置接入交换机SwitchA的GE0/0/1和GE0/0/2接口加入VLAN100,GE0/0/1的缺省VLAN为VLAN100。
    <span style="color:#333333"><span style="background-color:#dddddd"><HUAWEI> <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1378448865190921">system-view</strong>
    [HUAWEI] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1648629339190921">sysname SwitchA</strong>
    [SwitchA] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1879648753190921">vlan batch 100</strong>
    [SwitchA] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1340153122190921">interface gigabitethernet 0/0/1</strong>
    [SwitchA-GigabitEthernet0/0/1] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b629503485190921">port link-type trunk</strong>
    [SwitchA-GigabitEthernet0/0/1] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1384660746190921">port trunk pvid vlan 100</strong>
    [SwitchA-GigabitEthernet0/0/1] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b857905420190921">port trunk allow-pass vlan 100</strong>
    [SwitchA-GigabitEthernet0/0/1] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1233357300190921">port-isolate enable</strong>
    [SwitchA-GigabitEthernet0/0/1] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b994568433190921">quit</strong>
    [SwitchA] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b562585562190921">interface gigabitethernet 0/0/2</strong>
    [SwitchA-GigabitEthernet0/0/2] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1829872941190921">port link-type trunk</strong>
    [SwitchA-GigabitEthernet0/0/2] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1270991033190921">port trunk allow-pass vlan 100</strong>
    [SwitchA-GigabitEthernet0/0/2] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b917081183190921">quit</strong></span></span>
    # 配置汇聚交换机SwitchB的接口GE0/0/1和GE0/0/2加入VLAN100,接口GE0/0/2和GE0/0/3加入VLAN101。
    <span style="color:#333333"><span style="background-color:#dddddd"><HUAWEI> <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1540762340190921">system-view</strong>
    [HUAWEI] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b733737892190921">sysname SwitchB</strong>
    [SwitchB] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b625700484190921">vlan batch 100 101</strong>
    [SwitchB] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1740338427190921">interface gigabitethernet 0/0/1</strong>
    [SwitchB-GigabitEthernet0/0/1] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b819345497190921">port link-type trunk</strong>
    [SwitchB-GigabitEthernet0/0/1] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1981678118190921">port trunk allow-pass vlan 100</strong>
    [SwitchB-GigabitEthernet0/0/1] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b788140868190921">quit</strong>
    [SwitchB] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1074199566190921">interface gigabitethernet 0/0/2</strong>
    [SwitchB-GigabitEthernet0/0/2] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b687704922190921">port link-type trunk</strong>
    [SwitchB-GigabitEthernet0/0/2] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b963557263190921">port trunk allow-pass vlan 100 101</strong>
    [SwitchB-GigabitEthernet0/0/2] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b208179163190921">quit</strong>
    [SwitchB] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1144409798190921">interface gigabitethernet 0/0/3</strong>
    [SwitchB-GigabitEthernet0/0/3] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1587006719190921">port link-type trunk</strong>
    [SwitchB-GigabitEthernet0/0/3] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b936690975190921">port trunk allow-pass vlan 101</strong>
    [SwitchB-GigabitEthernet0/0/3] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b128121589190921">quit</strong></span></span>
    # 配置Router的接口GE1/0/0加入VLAN101,创建接口VLANIF101并配置IP地址为10.23.101.2/24。
    <span style="color:#333333"><span style="background-color:#dddddd"><Huawei> <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b118005268190921">system-view</strong>
    [Huawei] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1176501588190921">sysname Router</strong>
    [Router] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b995805857190921">vlan batch 101</strong>
    [Router] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b906637926190921">interface gigabitethernet 1/0/0</strong>
    [Router-GigabitEthernet1/0/0] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b406876624190921">port link-type trunk</strong>
    [Router-GigabitEthernet1/0/0] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1226529678190921">port trunk allow-pass vlan 101</strong>
    [Router-GigabitEthernet1/0/0] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1131638750190921">quit</strong>
    [Router] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b648829236190921">interface vlanif 101</strong>
    [Router-Vlanif101] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1969966747190921">ip address 10.23.101.2 24</strong>
    [Router-Vlanif101] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1246477905190921">quit</strong></span></span>
  2. 配置AC与其它网络设备互通

    如果AC直接连接AP,需要在AC直连AP的接口上配置缺省VLAN为管理VLAN100。

    # 配置AC的接口GE0/0/1加入VLAN100和VLAN101。
    <span style="color:#333333"><span style="background-color:#dddddd"><HUAWEI> <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1533901828190921">system-view</strong>
    [HUAWEI] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b783909607190921">sysname AC</strong>
    [AC] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b362960974190921">vlan batch 100 101</strong>
    [AC] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1510739881190921">interface gigabitethernet 0/0/1</strong>
    [AC-GigabitEthernet0/0/1] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1936092745190921">port link-type trunk</strong>
    [AC-GigabitEthernet0/0/1] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b273575249190921">port trunk allow-pass vlan 100 101</strong>
    [AC-GigabitEthernet0/0/1] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1361668507190921">quit</strong></span></span>
  3. 配置DHCP服务器为STA和AP分配IP地址

    # 在AC上配置VLANIF100接口为AP提供IP地址。
    <span style="color:#333333"><span style="background-color:#dddddd">[AC] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b270083456190921">dhcp enable</strong>
    [AC] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1697431376190921">interface vlanif 100</strong>
    [AC-Vlanif100] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1645914341190921">ip address 10.23.100.1 24</strong>
    [AC-Vlanif100] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b2011614048190921">dhcp select interface</strong>
    [AC-Vlanif100] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1870662344190921">quit</strong></span></span>
    # 在SwitchB上配置VLANIF101接口为STA提供IP地址,并指定10.23.101.2作为STA的默认网关地址。
    DNS服务器地址请根据实际需要配置。常用配置方法如下:
    • 接口地址池场景,需要在VLANIF接口视图下执行命令dhcp server dns-list ip-address &<1-8>。
    • 全局地址池场景,需要在IP地址池视图下执行命令dns-list ip-address &<1-8>。
    <span style="color:#333333"><span style="background-color:#dddddd">[SwitchB] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1746102230190921">dhcp enable</strong>
    [SwitchB] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b181711504190921">interface vlanif 101</strong>
    [SwitchB-Vlanif101] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1130572979190921">ip address 10.23.101.1 24</strong>
    [SwitchB-Vlanif101] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b133774347190921">dhcp select interface</strong>
    [SwitchB-Vlanif101] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1216259955190921">dhcp server gateway-list 10.23.101.2</strong>
    [SwitchB-Vlanif101] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b366557450190921">quit</strong></span></span>
  4. 配置AP上线

    # 创建AP组,用于将相同配置的AP都加入同一AP组中。
    <span style="color:#333333"><span style="background-color:#dddddd">[AC] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1451837292190921">wlan</strong>
    [AC-wlan-view] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1710308668190921">ap-group name ap-group1</strong>
    [AC-wlan-ap-group-ap-group1] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b294415960190921">quit</strong></span></span>
    # 创建域管理模板,在域管理模板下配置AC的国家码并在AP组下引用域管理模板。
    <span style="color:#333333"><span style="background-color:#dddddd">[AC-wlan-view] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1815954045190921">regulatory-domain-profile name default</strong>
    [AC-wlan-regulate-domain-default] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1765454957190921">country-code cn</strong>
    [AC-wlan-regulate-domain-default] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b464951690190921">quit</strong>
    [AC-wlan-view] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1132959133190921">ap-group name ap-group1</strong>
    [AC-wlan-ap-group-ap-group1] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b4510754102210">regulatory-domain-profile default</strong>
    Warning: Modifying the country code will clear channel, power and antenna gain configurations of the radio and reset the AP. Continue?[Y/N]:<strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_zh-cn_task_0175818418_b17491131153716">y</strong>  
    [AC-wlan-ap-group-ap-group1] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b101836067190921">quit</strong>
    [AC-wlan-view] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b465166413190921">quit</strong></span></span>
    # 配置AC的源接口。

    V200R021C00版本开始,配置CAPWAP源接口或源地址时,会检查和安全相关的配置是否已存在,包括DTLS加密的PSK、AC间DTLS加密的PSK、登录AP的用户名和密码、全局离线管理VAP的登录密码,均已存在才能成功配置,否则会提示用户先完成相关的配置。

    <span style="color:#333333"><span style="background-color:#dddddd">[AC] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b806281647190921">capwap source interface vlanif 100</strong>
    Set the DTLS PSK(contains 6-32 plain-text characters, or 48 or 68 cipher-text characters that must be a combination of at least two of the following: lowercase letters a to z, uppercase letters A to Z, digits, and special characters):******Set the DTLS inter-controller PSK(contains 6-32 plain-text characters, or 48 or 68 cipher-text characters that must be a combination of at least two of the following: lowercase letters a to z, uppercase letters A to Z, digits, and special characters):******Set the user name for FIT APs(contains 4-31 plain-text characters, which can only include letters, digits and underlines. And the first character must be a letter):adminSet the password for FIT APs(plain-text password of 8-128 characters or cipher-text password of 48-188 characters that must be a combination of at least three of the following: lowercase letters a to z, uppercase letters A to Z, digits, and special characters):********Set the global temporary-management psk(contains 8-63 plain-text characters, or 48-108 cipher-text characters that must be a combination of at least two of the following: lowercase letters a to z, uppercase letters A to Z, digits, and special characters):********</span></span>
    # 开启CAPWAP DTLS不认证方式。(V200R021C00及之后版本)
    <span style="color:#333333"><span style="background-color:#dddddd">[AC] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b15163144818377">capwap dtls no-auth enable</strong></span></span>

    V200R021C00版本开始,AC默认开启CAPWAP控制隧道的DTLS加密功能。开启该功能,添加AP时AP会上线失败,此时需要先开启CAPWAP DTLS不认证方式让AP上线,以便AP获取安全凭证,AP上线后应及时关闭该功能,避免未授权AP上线。

    # 在AC上离线导入AP,并将AP加入AP组“ap-group1”中。假设AP的MAC地址为60de-4476-e360,并且根据AP的部署位置为AP配置名称,便于从名称上就能够了解AP的部署位置。例如MAC地址为60de-4476-e360的AP部署在1号区域,命名此AP为area_1。

    ap auth-mode命令缺省情况下为MAC认证,如果之前没有修改其缺省配置,可以不用执行ap auth-mode mac-auth

    举例中使用的AP为AP5030DN,具有射频0和射频1两个射频。AP5030DN的射频0为2.4GHz射频,射频1为5GHz射频。

    <span style="color:#333333"><span style="background-color:#dddddd">[AC] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b763711121190921">wlan</strong>
    [AC-wlan-view] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1389711844190921">ap auth-mode mac-auth</strong>
    [AC-wlan-view] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1382708357190921">ap-id 0 ap-mac 60de-4476-e360</strong>
    [AC-wlan-ap-0] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1272920990190921">ap-name area_1</strong>
    Warning: This operation may cause AP reset. Continue? [Y/N]:<strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_zh-cn_task_0175818418_b460951517190906">y</strong>  
    [AC-wlan-ap-0] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b614746147190921">ap-group ap-group1</strong>
    Warning: This operation may cause AP reset. If the country code changes, it will clear channel, power and antenna gain configuration s of the radio, Whether to continue? [Y/N]:<strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_zh-cn_task_0175818418_b1651706244190906">y</strong>  
    [AC-wlan-ap-0] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b959850628190921">quit</strong></span></span>
    # 将AP上电后,当执行命令display ap all查看到AP的“State”字段为“nor”时,表示AP正常上线。
    <span style="color:#333333"><span style="background-color:#dddddd">[AC-wlan-view] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b482061123190921">display ap all</strong>
    Total AP information:
    nor  : normal          [1]
    Extra information:
    P  : insufficient power supply
    --------------------------------------------------------------------------------------------------
    ID   MAC            Name   Group     IP            Type            State STA Uptime      ExtraInfo
    --------------------------------------------------------------------------------------------------
    0    60de-4476-e360 area_1 ap-group1 10.23.100.254 AP5030DN        nor   0   10S         -
    --------------------------------------------------------------------------------------------------
    Total: 1</span></span>
    # 关闭CAPWAP DTLS不认证方式。(V200R021C00及之后版本)
    <span style="color:#333333"><span style="background-color:#dddddd">[AC-wlan-view] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b3420155514467">quit</strong>
    [AC] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1898583494615">undo capwap dtls no-auth enable</strong>
    [AC] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b9381917104714">wlan</strong></span></span>
  5. 配置WLAN业务参数

    # 创建名为“wlan-net”的安全模板,并配置安全策略。

    举例中以配置WPA-WPA2+PSK+AES的安全策略为例,密码为“a1234567”,实际配置中请根据实际情况,配置符合实际要求的安全策略。

    <span style="color:#333333"><span style="background-color:#dddddd">[AC-wlan-view] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1991067776190921">security-profile name wlan-net</strong>
    [AC-wlan-sec-prof-wlan-net] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b851752672190921">security wpa-wpa2 psk pass-phrase a1234567 aes</strong>
    [AC-wlan-sec-prof-wlan-net] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b337241812190921">quit</strong></span></span>
    # 创建名为“wlan-net”的SSID模板,并配置SSID名称为“wlan-net”。
    <span style="color:#333333"><span style="background-color:#dddddd">[AC-wlan-view] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b69022931190921">ssid-profile name wlan-net</strong>
    [AC-wlan-ssid-prof-wlan-net] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b36723145190921">ssid wlan-net</strong>
    [AC-wlan-ssid-prof-wlan-net] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1738903244190921">quit</strong></span></span>
    # 创建名为“wlan-net”的VAP模板,配置业务数据转发模式、业务VLAN,并且引用安全模板和SSID模板。
    <span style="color:#333333"><span style="background-color:#dddddd">[AC-wlan-view] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1922555320190921">vap-profile name wlan-net</strong>
    [AC-wlan-vap-prof-wlan-net] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b13690656190921">forward-mode tunnel</strong>
    [AC-wlan-vap-prof-wlan-net] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1155220284190921">service-vlan vlan-id 101</strong>
    [AC-wlan-vap-prof-wlan-net] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1928564414190921">security-profile wlan-net</strong>
    [AC-wlan-vap-prof-wlan-net] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b889800077190921">ssid-profile wlan-net</strong>
    [AC-wlan-vap-prof-wlan-net] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1869922190190921">quit</strong></span></span>
    # 配置AP组引用VAP模板,AP上射频0和射频1都使用VAP模板“wlan-net”的配置。
    <span style="color:#333333"><span style="background-color:#dddddd">[AC-wlan-view] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b2051092768190921">ap-group name ap-group1</strong>
    [AC-wlan-ap-group-ap-group1] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1753511747190921">vap-profile wlan-net wlan 1 radio 0</strong>
    [AC-wlan-ap-group-ap-group1] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1212706755190921">vap-profile wlan-net wlan 1 radio 1</strong>
    [AC-wlan-ap-group-ap-group1] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b729861449190921">quit</strong></span></span>
  6. 配置AP射频的信道和功率

    射频的信道和功率自动调优功能默认开启,如果不关闭此功能则会导致手动配置不生效。举例中AP射频的信道和功率仅为示例,实际配置中请根据AP的国家码和网规结果进行配置。

    # 关闭AP射频0的信道和功率自动调优功能,并配置AP射频0的信道和功率。
    <span style="color:#333333"><span style="background-color:#dddddd">[AC-wlan-view] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912356_b1423607009190921">ap-id 0</strong>
    [AC-wlan-ap-0] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912356_b1534489953190921">radio 0</strong>
    [AC-wlan-radio-0/0] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912356_b733594144190921">calibrate auto-channel-select disable</strong>
    [AC-wlan-radio-0/0] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912356_b1154293079190921">calibrate auto-txpower-select disable</strong>
    [AC-wlan-radio-0/0] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912356_b1858200296190921">channel 20mhz 6</strong>
    Warning: This action may cause service interruption. Continue?[Y/N]<strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912356_zh-cn_task_0175818418_b1384307436190906">y</strong> 
    [AC-wlan-radio-0/0] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912356_b554899294190921">eirp 127</strong>
    [AC-wlan-radio-0/0] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912356_b1779547689190921">quit</strong></span></span>
    # 关闭AP射频1的信道和功率自动调优功能,并配置AP射频1的信道和功率。
    <span style="color:#333333"><span style="background-color:#dddddd">[AC-wlan-ap-0] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912356_b33229250190921">radio 1</strong>
    [AC-wlan-radio-0/1] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912356_b327597144190921">calibrate auto-channel-select disable</strong>
    [AC-wlan-radio-0/1] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912356_b1164564697190921">calibrate auto-txpower-select disable</strong>
    [AC-wlan-radio-0/1] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912356_b201103780190921">channel 20mhz 149</strong>
    Warning: This action may cause service interruption. Continue?[Y/N]<strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912356_zh-cn_task_0175818418_b1384307436190906_1">y</strong> 
    [AC-wlan-radio-0/1] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912356_b652286665190921">eirp 127</strong>
    [AC-wlan-radio-0/1] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912356_b1440636620190921">quit</strong>
    [AC-wlan-ap-0] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912356_b904227301190921">quit</strong></span></span>
  7. 配置攻击检测功能

    # 开启WPA2-PSK认证方式的暴力破解密钥攻击检测功能和泛洪攻击检测功能。

    <span style="color:#333333"><span style="background-color:#dddddd">[AC-wlan-view] <strong id="ZH-CN_TASK_0176912511__b977739584190922">ap-group name ap-group1</strong>
    [AC-wlan-ap-group-ap-group1] <strong id="ZH-CN_TASK_0176912511__b840004881190922">radio 0</strong>
    [AC-wlan-group-radio-ap-group1/0] <strong id="ZH-CN_TASK_0176912511__b14531149104319">wids attack detect wpa2-psk enable</strong>
    [AC-wlan-group-radio-ap-group1/0] <strong id="ZH-CN_TASK_0176912511__b768911304517">wids attack detect flood enable</strong>
    [AC-wlan-group-radio-ap-group1/0] <strong id="ZH-CN_TASK_0176912511__b1177918651190922">quit</strong>
    [AC-wlan-ap-group-ap-group1] <strong id="ZH-CN_TASK_0176912511__b1736012676190922">radio 1</strong>
    [AC-wlan-group-radio-ap-group1/1] <strong id="ZH-CN_TASK_0176912511__b1627117111471">wids attack detect wpa2-psk enable</strong>
    [AC-wlan-group-radio-ap-group1/1] <strong id="ZH-CN_TASK_0176912511__b3119114913485">wids attack detect flood enable</strong>
    [AC-wlan-group-radio-ap-group1/1] <strong id="ZH-CN_TASK_0176912511__b630499311190922">quit</strong>
    [AC-wlan-ap-group-ap-group1] <strong id="ZH-CN_TASK_0176912511__b68507858190922">quit</strong></span></span>

    # 创建WIDS模板。

    <span style="color:#333333"><span style="background-color:#dddddd">[AC-wlan-view] <strong id="ZH-CN_TASK_0176912511__b203309680191210">wids-profile name default</strong></span></span>

    # 配置WPA2-PSK认证方式的暴力破解密钥攻击检测的检测周期为70秒,检测周期内允许密钥错误的次数为25次,静默时间为700秒。

    <span style="color:#333333"><span style="background-color:#dddddd">[AC-wlan-wids-prof-default] <strong id="ZH-CN_TASK_0176912511__b1347713199190922">brute-force-detect interval 70</strong>
    [AC-wlan-wids-prof-default] <strong id="ZH-CN_TASK_0176912511__b2054914072190922">brute-force-detect threshold 25</strong>
    [AC-wlan-wids-prof-default] <strong id="ZH-CN_TASK_0176912511__b980686433190922">brute-force-detect quiet-time 700</strong></span></span>

    # 配置泛洪攻击检测的检测周期为70秒,泛洪攻击检测阈值为350个,静默时间为700秒。

    <span style="color:#333333"><span style="background-color:#dddddd">[AC-wlan-wids-prof-default] <strong id="ZH-CN_TASK_0176912511__b1862380200190922">flood-detect interval 70</strong>
    [AC-wlan-wids-prof-default] <strong id="ZH-CN_TASK_0176912511__b151720623190922">flood-detect threshold 350</strong>
    [AC-wlan-wids-prof-default] <strong id="ZH-CN_TASK_0176912511__b484356709190922">flood-detect quiet-time 700</strong></span></span>
  8. 配置动态黑名单功能

    # 使能动态黑名单功能。

    <span style="color:#333333"><span style="background-color:#dddddd">[AC-wlan-wids-prof-default] <strong id="ZH-CN_TASK_0176912511__b4894617203">undo dynamic-blacklist disable</strong>
    [AC-wlan-wids-prof-default] <strong id="ZH-CN_TASK_0176912511__b1973602061190922">quit</strong></span></span>

    # 创建名为“wlan-system”的AP系统模板,配置动态黑名单老化时间为200秒。

    <span style="color:#333333"><span style="background-color:#dddddd">[AC-wlan-view] <strong id="ZH-CN_TASK_0176912511__b1784292474190922">ap-system-profile name wlan-system</strong>
    [AC-wlan-ap-system-prof-wlan-system] <strong id="ZH-CN_TASK_0176912511__b1518148419190922">dynamic-blacklist aging-time 200</strong>
    [AC-wlan-ap-system-prof-wlan-system] <strong id="ZH-CN_TASK_0176912511__b597806412190922">quit</strong></span></span>
  9. 在AP组“ap-group1”中引用WIDS模板“wlan-wids”和AP系统模板“wlan-system”

    <span style="color:#333333"><span style="background-color:#dddddd">[AC-wlan-view] <strong id="ZH-CN_TASK_0176912511__b388743598190922">ap-group name ap-group1</strong>
    [AC-wlan-ap-group-ap-group1] <strong id="ZH-CN_TASK_0176912511__b1950632949190922">ap-system-profile wlan-system</strong>
    [AC-wlan-ap-group-ap-group1] <strong id="ZH-CN_TASK_0176912511__b1961496138190922">quit</strong></span></span>
  10. 验证配置结果

    配置完成后,当有其他设备对WLAN网络进行攻击时,通过display wlan ids attack-detected all命令,可以查看到检测到的攻击设备。

    <span style="color:#333333"><span style="background-color:#dddddd">[AC-wlan-view] <strong id="ZH-CN_TASK_0176912511__b1908231298190922">display wlan ids attack-detected all</strong>
    #AP: Number of monitor APs that have detected the device
    AT: Last detected attack type
    CH: Channel number
    act: Action frame            asr: Association request
    aur: Authentication request  daf: Deauthentication frame
    dar: Disassociation request  wiv: Weak IV detected
    pbr: Probe request           rar: Reassociation request
    eaps: EAPOL start frame      eapl: EAPOL logoff frame
    saf: Spoofed disassociation frame
    sdf: Spoofed deauthentication frame
    otsf: Other types of spoofing frames
    -------------------------------------------------------------------------------
    MAC address     AT     CH   RSSI(dBm)  Last detected time     #AP
    -------------------------------------------------------------------------------
    000b-c002-9c81  pbr    165  -87        2014-11-20/15:51:13    1
    0024-2376-03e9  pbr    165  -84        2014-11-20/15:51:13    1
    0046-4b74-691f  act    165  -67        2014-11-20/15:51:13    1
    -------------------------------------------------------------------------------
    Total: 3, printed: 3</span></span>

    通过display wlan dynamic-blacklist all命令,可以查看加入动态黑名单的攻击设备。

    <span style="color:#333333"><span style="background-color:#dddddd">[AC-wlan-view] <strong id="ZH-CN_TASK_0176912511__b1961785952190922">display wlan dynamic-blacklist all</strong>
    #AP: Number of monitor APs that have detected the device
    act: Action frame            asr: Association request
    aur: Authentication request  daf: Deauthentication frame
    dar: Disassociation request  eapl: EAPOL logoff frame
    pbr: Probe request           rar: Reassociation request
    eaps: EAPOL start frame
    -------------------------------------------------------------------------------
    MAC address       Last detected time    Reason   #AP   LAT
    -------------------------------------------------------------------------------
    000b-c002-9c81    2014-11-20/16:15:53   pbr      1     100
    0024-2376-03e9    2014-11-20/16:15:53   pbr      1     100
    0046-4b74-691f    2014-11-20/16:15:53   act      1     100
    -------------------------------------------------------------------------------
    Total: 3, printed: 3
    </span></span>
配置文件
  • SwitchA的配置文件

    <span style="color:#333333"><span style="background-color:#dddddd">#
    sysname SwitchA
    #
    vlan batch 100
    #
    interface GigabitEthernet0/0/1port link-type trunkport trunk pvid vlan 100port trunk allow-pass vlan 100port-isolate enable group 1
    #
    interface GigabitEthernet0/0/2port link-type trunkport trunk allow-pass vlan 100
    #
    return</span></span>
  • SwitchB的配置文件

    <span style="color:#333333"><span style="background-color:#dddddd">#
    sysname SwitchB
    #
    vlan batch 100 to 101
    #
    dhcp enable
    #
    interface Vlanif101ip address 10.23.101.1 255.255.255.0dhcp select interfacedhcp server gateway-list 10.23.101.2
    #
    interface GigabitEthernet0/0/1port link-type trunkport trunk allow-pass vlan 100
    #
    interface GigabitEthernet0/0/2port link-type trunkport trunk allow-pass vlan 100 to 101
    #
    interface GigabitEthernet0/0/3port link-type trunkport trunk allow-pass vlan 101
    #
    return</span></span>
  • Router的配置文件

    <span style="color:#333333"><span style="background-color:#dddddd">#
    sysname Router
    #
    vlan batch 101
    #
    interface Vlanif101ip address 10.23.101.2 255.255.255.0
    #
    interface GigabitEthernet1/0/0port link-type trunkport trunk allow-pass vlan 101
    #
    return
    </span></span>
  • AC的配置文件

    <span style="color:#333333"><span style="background-color:#dddddd">#sysname AC
    #
    vlan batch 100 to 101
    #
    dhcp enable
    #
    interface Vlanif100ip address 10.23.100.1 255.255.255.0dhcp select interface
    #
    interface GigabitEthernet0/0/1port link-type trunkport trunk allow-pass vlan 100 101
    #
    capwap source interface vlanif100
    #
    wlansecurity-profile name wlan-netsecurity wpa-wpa2 psk pass-phrase %^%#m"tz0f>~7.[`^6RWdzwCy16hJj/Mc!,}s`X*B]}A%^%# aesssid-profile name wlan-netssid wlan-netvap-profile name wlan-netforward-mode tunnelservice-vlan vlan-id 101ssid-profile wlan-netsecurity-profile wlan-netregulatory-domain-profile name defaultwids-profile name defaultflood-detect interval 70flood-detect threshold 350flood-detect quiet-time 700brute-force-detect interval 70brute-force-detect threshold 25brute-force-detect quiet-time 700ap-system-profile name wlan-systemdynamic-blacklist aging-time 200ap-group name ap-group1ap-system-profile wlan-systemwids-profile defaultradio 0vap-profile wlan-net wlan 1wids attack detect flood enablewids attack detect wpa2-psk enableradio 1vap-profile wlan-net wlan 1wids attack detect flood enablewids attack detect wpa2-psk enableap-id 0 type-id 35 ap-mac 60de-4476-e360 ap-sn 210235554710CB000042ap-name area_1ap-group ap-group1radio 0channel 20mhz 6eirp 127calibrate auto-channel-select disable    calibrate auto-txpower-select disableradio 1channel 20mhz 149eirp 127calibrate auto-channel-select disable    calibrate auto-txpower-select disable
    #
    return</span></span>

本文来自互联网用户投稿,该文观点仅代表作者本人,不代表本站立场。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如若转载,请注明出处:http://www.mzph.cn/news/708596.shtml

如若内容造成侵权/违法违规/事实不符,请联系多彩编程网进行投诉反馈email:809451989@qq.com,一经查实,立即删除!

相关文章

车灯典型方案 H5528L 降压恒流芯片12V240V360V48V60V72V90V转9V12V 高低亮 性价比高

降压恒流芯片支持高低亮工作原理&#xff1a; 通过PWM&#xff08;脉冲宽度调制&#xff09;技术来调节开关管的开关时间&#xff0c;从而实现稳定的输出电压和电流&#xff0c;保持LED灯的亮度稳定。当需要调节LED灯的亮度时&#xff0c;可以通过改变PWM信号的占空比来实现。…

【信号分析】01/说在前面

全课程思维 #mermaid-svg-va4HsweZFSOJpLXa {font-family:"trebuchet ms",verdana,arial,sans-serif;font-size:16px;fill:#333;}#mermaid-svg-va4HsweZFSOJpLXa .error-icon{fill:#552222;}#mermaid-svg-va4HsweZFSOJpLXa .error-text{fill:#552222;stroke:#552222;…

Bert-as-service 实战

参考&#xff1a;bert-as-service 详细使用指南写给初学者-CSDN博客 GitHub - ymcui/Chinese-BERT-wwm: Pre-Training with Whole Word Masking for Chinese BERT&#xff08;中文BERT-wwm系列模型&#xff09; 下载&#xff1a;https://storage.googleapis.com/bert_models/…

使用Django的admin功能管理数据_vscode

之前的文章 项目 hello_django, app名 hello&#xff0c;已有的model LogMessage&#xff1a; https://blog.csdn.net/weixin_44741835/article/details/136202771?spm1001.2014.3001.5502 参考得到电子书&#xff1a;第八章。 https://www.dedao.cn/ebook/reader?idrEQKv6…

linux系统-----------搭建LNMP 架构

PHP(Hypertext Preprocessor 超文本预处理器)是通用服务器端脚本编程语言&#xff0c;主要用于web开发实现动态web页面&#xff0c;也是最早实现将脚本嵌入HTML源码文档中的服务器端脚本语言之一。同时&#xff0c;php还提供了一个命令行接口&#xff0c;因此&#xff0c;其也可…

能在手机上运行,仅仅0.5B大小的小语言模型MobiLlama

模型介绍 该模型基于LLaMA-7B架构设计&#xff0c;旨在能够在边缘设备上高效运行&#xff0c;无需将数据发送到远程服务器或云端处理。如智能手机、平板电脑、智能手表等。MobiLlama模型虽然体积小、对资源的需求低&#xff0c;但仍能提供高精度的语言理解和生成能力。项目还提…

java 通过 microsoft graph 调用outlook

废话不多说 一 官方文档 先看一下官方文档&#xff0c;https://learn.microsoft.com/zh-cn/graph/tutorials/java?contextoutlook%2Fcontext&tabsaad&tutorial-step1 其中的代码&#xff0c;可以通过地址下载&#xff1a;https://developer.microsoft.com/en-us/gra…

NutUI + taro +vue 开发遇到的问题 使用popup组件 内部元素滚动遇到的的问题

1 popup 弹出内容时 弹出的框内元素数据很长需要滚动时 本地可以正常滚动 打包成小程序后无法滚动 如这样的免责条款内容 代码如下 解决办法 1 把2处的单位换成百分比 弹框能滚动但是 是popup 里面所有的元素都一起滚动 导致标题都滚走了 2 scroll-y 改成&#xff1a; :scrol…

单片机05__串口USART通信__按键控制向上位机传输字符串

串口USART通信 通用UART介绍 1.通信的概念 计算机与外界进行信息交换的过程称之为通信。 在通信的过程中&#xff0c;通信双方都需要遵守的规则称之为通信协议。 硬件协议&#xff1a;将数据以什么样的方式传输过去 软件协议&#xff1a;将数据以什么样的顺序传输过去 2.常用…

微服务之qiankun主项目+子项目搭建

主项目使用history&#xff0c;子项目使用hash模式 1. 下载安装"qiankun": "^2.10.13"2. 手动调用qiankun,使用vue脚手架搭建的项目1. 主项目配置&#xff08;我使用的是手动调用乾坤&#xff0c;在指定页面显示内容&#xff09;1. 要使用的页面中引入乾坤…

MyBatis概述

三层架构 表现层&#xff1a;直接和前端交互&#xff0c;接受AJAX请求&#xff0c;返回json数据业务层&#xff1a;一是处理前端的请求&#xff0c;二是返回持久层获取的数据持久层(数据访问层)&#xff1a;直接操作数据库&#xff0c;完成CRUD&#xff0c;返回数据给业务层 …

李沐动手学习深度学习——3.2练习

以下是个人理解&#xff0c;希望进行讨论求解。 练习 1. 如果我们将权重初始化为零&#xff0c;会发生什么。算法仍然有效吗&#xff1f; 根据SGD算法公式如上&#xff0c;第一次迭代的值可知w只与b相关&#xff0c;而对于b的迭代更新&#xff0c;只是与b的初始值相关&#x…

docker中hyperf项目配置虚拟域名

在使用hyperf框架时&#xff0c;直接用了docker环境进行开发 下载镜像运行容器 docker run --name hyperf -v /data/project:/data/project -p 9501:9501 -itd -w /data/project --privileged -u root --entrypoint /bin/sh 镜像ID配置docker-compose.yml version: "3.…

亚马逊自养号测评:如何安全搭建环境,有效规避风险

要在亚马逊上进行自养号测评&#xff0c;构建一个真实的国外环境至关重要。这包括模拟国外的服务器、IP地址、浏览器环境&#xff0c;甚至支付方式&#xff0c;以创建一个完整的国际操作环境。这样的环境能让我们自由注册、养号并下单&#xff0c;确保所有操作均符合国际规范。…

企业级指针仪表读数YOLOV8NANO

企业级指针仪表读数&#xff0c;采用YOLOV8NANO训练&#xff0c;检测表盘和表芯&#xff0c;得到PT模型&#xff0c;然后转换ONNX&#xff0c;让OPENCV调用。然后提取表芯区域&#xff0c;通过极坐标转换为直角坐标&#xff0c;再通过检测指针和刻度&#xff0c;换算成比例&…

Chapter 8 - 19. Congestion Management in TCP Storage Networks

Queue Depth Monitoring and Microburst Detection Queue depth monitoring and microburst detection capture the events that may cause congestion at a lower granularity but are unnoticed by other means due to long polling intervals. 队列深度监控和微爆检测可捕捉…

前端-BOM和DOM的区别和用法

首先上图&#xff0c;这是整个JAVASCRIPTD 结构&#xff0c;因此我们可以得出一个关系等式 JavaScript ECMAscript BOM DOMECMAscript&#xff1a; 是一种由 ECMA国际&#xff08;前身为欧洲计算机制造商协会&#xff09;通过 ECMA-262 标准化的脚本程序设计语言&#xff0…

二分图---染色法(判断二分图),匈牙利算法(二分图的最大匹配) //概念,应用场景,判定证明,算法思路,示例

目录 二分图概念 二分图应用场景 如何判定一个图是否可以划分成二分图 证明 染色法 原理步骤 时间复杂度 算法思路 例子 匈牙利算法 概念 匈牙利使用算法前提,场景 时间复杂度 算法思路 例子 二分图概念 二分图是图论中的一个重要概念&#xff0c;指的是一个图的…

Java四大引用类型

四大引用类型 从JDK 1.2版本开始&#xff0c;对象的引用被划分为4种级别&#xff0c;从而使程序能更加灵活地控制对象的生命周期。这4种级别由高到低依次为&#xff1a;强引用、软引用、弱引用和虚引用 不同的引用类型&#xff0c;主要体现的是对象不同的可达性&#xff08;r…

【vue3学习笔记】Suspense组件;vue3中的其它改变

尚硅谷Vue2.0Vue3.0全套教程丨vuejs从入门到精通 课程 P167节 《Suspense组件》笔记 想要学习suspense&#xff0c;先来了解静态组件与异步组件。 静态引入与异步引入&#xff1a; 在network中将网速调慢&#xff0c;观察在静态引入和异步引入模式下&#xff0c;两个组件的加载…