赞
踩
组网图形
配置项 | 数据 |
---|---|
AP管理VLAN | VLAN100 |
STA业务VLAN | VLAN101 |
DHCP服务器 | AC作为DHCP服务器为AP分配IP地址 汇聚交换机SwitchB作为DHCP服务器为STA分配IP地址,STA的默认网关为10.23.101.2 |
AP的IP地址池 | 10.23.100.2~10.23.100.254/24 |
STA的IP地址池 | 10.23.101.3~10.23.101.254/24 |
AC的源接口IP地址 | VLANIF100:10.23.100.1/24 |
AP组 |
|
域管理模板 |
|
SSID模板 |
|
安全模板 |
|
VAP模板 |
|
WIDS模板 |
|
AP系统模板 |
|
建议在与AP直连的设备接口上配置端口隔离,如果不配置端口隔离,尤其是业务数据转发方式采用直接转发时,可能会在VLAN内形成大量不必要的广播报文,导致网络阻塞,影响用户体验。
隧道转发模式下,管理VLAN和业务VLAN不能配置为同一VLAN,且AP和AC之间只能放通管理VLAN,不能放通业务VLAN。
- <span style="color:#333333"><span style="background-color:#dddddd"><HUAWEI> <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1378448865190921">system-view</strong>
- [HUAWEI] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1648629339190921">sysname SwitchA</strong>
- [SwitchA] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1879648753190921">vlan batch 100</strong>
- [SwitchA] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1340153122190921">interface gigabitethernet 0/0/1</strong>
- [SwitchA-GigabitEthernet0/0/1] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b629503485190921">port link-type trunk</strong>
- [SwitchA-GigabitEthernet0/0/1] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1384660746190921">port trunk pvid vlan 100</strong>
- [SwitchA-GigabitEthernet0/0/1] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b857905420190921">port trunk allow-pass vlan 100</strong>
- [SwitchA-GigabitEthernet0/0/1] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1233357300190921">port-isolate enable</strong>
- [SwitchA-GigabitEthernet0/0/1] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b994568433190921">quit</strong>
- [SwitchA] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b562585562190921">interface gigabitethernet 0/0/2</strong>
- [SwitchA-GigabitEthernet0/0/2] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1829872941190921">port link-type trunk</strong>
- [SwitchA-GigabitEthernet0/0/2] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1270991033190921">port trunk allow-pass vlan 100</strong>
- [SwitchA-GigabitEthernet0/0/2] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b917081183190921">quit</strong></span></span>
- <span style="color:#333333"><span style="background-color:#dddddd"><HUAWEI> <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1540762340190921">system-view</strong>
- [HUAWEI] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b733737892190921">sysname SwitchB</strong>
- [SwitchB] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b625700484190921">vlan batch 100 101</strong>
- [SwitchB] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1740338427190921">interface gigabitethernet 0/0/1</strong>
- [SwitchB-GigabitEthernet0/0/1] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b819345497190921">port link-type trunk</strong>
- [SwitchB-GigabitEthernet0/0/1] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1981678118190921">port trunk allow-pass vlan 100</strong>
- [SwitchB-GigabitEthernet0/0/1] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b788140868190921">quit</strong>
- [SwitchB] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1074199566190921">interface gigabitethernet 0/0/2</strong>
- [SwitchB-GigabitEthernet0/0/2] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b687704922190921">port link-type trunk</strong>
- [SwitchB-GigabitEthernet0/0/2] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b963557263190921">port trunk allow-pass vlan 100 101</strong>
- [SwitchB-GigabitEthernet0/0/2] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b208179163190921">quit</strong>
- [SwitchB] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1144409798190921">interface gigabitethernet 0/0/3</strong>
- [SwitchB-GigabitEthernet0/0/3] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1587006719190921">port link-type trunk</strong>
- [SwitchB-GigabitEthernet0/0/3] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b936690975190921">port trunk allow-pass vlan 101</strong>
- [SwitchB-GigabitEthernet0/0/3] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b128121589190921">quit</strong></span></span>
- <span style="color:#333333"><span style="background-color:#dddddd"><Huawei> <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b118005268190921">system-view</strong>
- [Huawei] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1176501588190921">sysname Router</strong>
- [Router] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b995805857190921">vlan batch 101</strong>
- [Router] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b906637926190921">interface gigabitethernet 1/0/0</strong>
- [Router-GigabitEthernet1/0/0] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b406876624190921">port link-type trunk</strong>
- [Router-GigabitEthernet1/0/0] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1226529678190921">port trunk allow-pass vlan 101</strong>
- [Router-GigabitEthernet1/0/0] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1131638750190921">quit</strong>
- [Router] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b648829236190921">interface vlanif 101</strong>
- [Router-Vlanif101] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1969966747190921">ip address 10.23.101.2 24</strong>
- [Router-Vlanif101] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1246477905190921">quit</strong></span></span>
如果AC直接连接AP,需要在AC直连AP的接口上配置缺省VLAN为管理VLAN100。
- <span style="color:#333333"><span style="background-color:#dddddd"><HUAWEI> <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1533901828190921">system-view</strong>
- [HUAWEI] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b783909607190921">sysname AC</strong>
- [AC] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b362960974190921">vlan batch 100 101</strong>
- [AC] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1510739881190921">interface gigabitethernet 0/0/1</strong>
- [AC-GigabitEthernet0/0/1] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1936092745190921">port link-type trunk</strong>
- [AC-GigabitEthernet0/0/1] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b273575249190921">port trunk allow-pass vlan 100 101</strong>
- [AC-GigabitEthernet0/0/1] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1361668507190921">quit</strong></span></span>
- <span style="color:#333333"><span style="background-color:#dddddd">[AC] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b270083456190921">dhcp enable</strong>
- [AC] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1697431376190921">interface vlanif 100</strong>
- [AC-Vlanif100] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1645914341190921">ip address 10.23.100.1 24</strong>
- [AC-Vlanif100] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b2011614048190921">dhcp select interface</strong>
- [AC-Vlanif100] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1870662344190921">quit</strong></span></span>
- <span style="color:#333333"><span style="background-color:#dddddd">[SwitchB] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1746102230190921">dhcp enable</strong>
- [SwitchB] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b181711504190921">interface vlanif 101</strong>
- [SwitchB-Vlanif101] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1130572979190921">ip address 10.23.101.1 24</strong>
- [SwitchB-Vlanif101] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b133774347190921">dhcp select interface</strong>
- [SwitchB-Vlanif101] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1216259955190921">dhcp server gateway-list 10.23.101.2</strong>
- [SwitchB-Vlanif101] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b366557450190921">quit</strong></span></span>
- <span style="color:#333333"><span style="background-color:#dddddd">[AC] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1451837292190921">wlan</strong>
- [AC-wlan-view] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1710308668190921">ap-group name ap-group1</strong>
- [AC-wlan-ap-group-ap-group1] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b294415960190921">quit</strong></span></span>
- <span style="color:#333333"><span style="background-color:#dddddd">[AC-wlan-view] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1815954045190921">regulatory-domain-profile name default</strong>
- [AC-wlan-regulate-domain-default] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1765454957190921">country-code cn</strong>
- [AC-wlan-regulate-domain-default] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b464951690190921">quit</strong>
- [AC-wlan-view] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1132959133190921">ap-group name ap-group1</strong>
- [AC-wlan-ap-group-ap-group1] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b4510754102210">regulatory-domain-profile default</strong>
- Warning: Modifying the country code will clear channel, power and antenna gain configurations of the radio and reset the AP. Continue?[Y/N]:<strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_zh-cn_task_0175818418_b17491131153716">y</strong>
- [AC-wlan-ap-group-ap-group1] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b101836067190921">quit</strong>
- [AC-wlan-view] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b465166413190921">quit</strong></span></span>
V200R021C00版本开始,配置CAPWAP源接口或源地址时,会检查和安全相关的配置是否已存在,包括DTLS加密的PSK、AC间DTLS加密的PSK、登录AP的用户名和密码、全局离线管理VAP的登录密码,均已存在才能成功配置,否则会提示用户先完成相关的配置。
- <span style="color:#333333"><span style="background-color:#dddddd">[AC] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b806281647190921">capwap source interface vlanif 100</strong>
- Set the DTLS PSK(contains 6-32 plain-text characters, or 48 or 68 cipher-text characters that must be a combination of at least two of the following: lowercase letters a to z, uppercase letters A to Z, digits, and special characters):******
-
- Set the DTLS inter-controller PSK(contains 6-32 plain-text characters, or 48 or 68 cipher-text characters that must be a combination of at least two of the following: lowercase letters a to z, uppercase letters A to Z, digits, and special characters):******
-
- Set the user name for FIT APs(contains 4-31 plain-text characters, which can only include letters, digits and underlines. And the first character must be a letter):admin
-
- Set the password for FIT APs(plain-text password of 8-128 characters or cipher-text password of 48-188 characters that must be a combination of at least three of the following: lowercase letters a to z, uppercase letters A to Z, digits, and special characters):********
-
- Set the global temporary-management psk(contains 8-63 plain-text characters, or 48-108 cipher-text characters that must be a combination of at least two of the following: lowercase letters a to z, uppercase letters A to Z, digits, and special characters):********</span></span>
<span style="color:#333333"><span style="background-color:#dddddd">[AC] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b15163144818377">capwap dtls no-auth enable</strong></span></span>
V200R021C00版本开始,AC默认开启CAPWAP控制隧道的DTLS加密功能。开启该功能,添加AP时AP会上线失败,此时需要先开启CAPWAP DTLS不认证方式让AP上线,以便AP获取安全凭证,AP上线后应及时关闭该功能,避免未授权AP上线。
ap auth-mode命令缺省情况下为MAC认证,如果之前没有修改其缺省配置,可以不用执行ap auth-mode mac-auth。
举例中使用的AP为AP5030DN,具有射频0和射频1两个射频。AP5030DN的射频0为2.4GHz射频,射频1为5GHz射频。
- <span style="color:#333333"><span style="background-color:#dddddd">[AC] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b763711121190921">wlan</strong>
- [AC-wlan-view] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1389711844190921">ap auth-mode mac-auth</strong>
- [AC-wlan-view] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1382708357190921">ap-id 0 ap-mac 60de-4476-e360</strong>
- [AC-wlan-ap-0] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1272920990190921">ap-name area_1</strong>
- Warning: This operation may cause AP reset. Continue? [Y/N]:<strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_zh-cn_task_0175818418_b460951517190906">y</strong>
- [AC-wlan-ap-0] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b614746147190921">ap-group ap-group1</strong>
- Warning: This operation may cause AP reset. If the country code changes, it will clear channel, power and antenna gain configuration s of the radio, Whether to continue? [Y/N]:<strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_zh-cn_task_0175818418_b1651706244190906">y</strong>
- [AC-wlan-ap-0] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b959850628190921">quit</strong></span></span>
- <span style="color:#333333"><span style="background-color:#dddddd">[AC-wlan-view] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b482061123190921">display ap all</strong>
- Total AP information:
- nor : normal [1]
- Extra information:
- P : insufficient power supply
- --------------------------------------------------------------------------------------------------
- ID MAC Name Group IP Type State STA Uptime ExtraInfo
- --------------------------------------------------------------------------------------------------
- 0 60de-4476-e360 area_1 ap-group1 10.23.100.254 AP5030DN nor 0 10S -
- --------------------------------------------------------------------------------------------------
- Total: 1</span></span>
- <span style="color:#333333"><span style="background-color:#dddddd">[AC-wlan-view] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b3420155514467">quit</strong>
- [AC] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1898583494615">undo capwap dtls no-auth enable</strong>
- [AC] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b9381917104714">wlan</strong></span></span>
举例中以配置WPA-WPA2+PSK+AES的安全策略为例,密码为“a1234567”,实际配置中请根据实际情况,配置符合实际要求的安全策略。
- <span style="color:#333333"><span style="background-color:#dddddd">[AC-wlan-view] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1991067776190921">security-profile name wlan-net</strong>
- [AC-wlan-sec-prof-wlan-net] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b851752672190921">security wpa-wpa2 psk pass-phrase a1234567 aes</strong>
- [AC-wlan-sec-prof-wlan-net] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b337241812190921">quit</strong></span></span>
- <span style="color:#333333"><span style="background-color:#dddddd">[AC-wlan-view] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b69022931190921">ssid-profile name wlan-net</strong>
- [AC-wlan-ssid-prof-wlan-net] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b36723145190921">ssid wlan-net</strong>
- [AC-wlan-ssid-prof-wlan-net] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1738903244190921">quit</strong></span></span>
- <span style="color:#333333"><span style="background-color:#dddddd">[AC-wlan-view] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1922555320190921">vap-profile name wlan-net</strong>
- [AC-wlan-vap-prof-wlan-net] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b13690656190921">forward-mode tunnel</strong>
- [AC-wlan-vap-prof-wlan-net] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1155220284190921">service-vlan vlan-id 101</strong>
- [AC-wlan-vap-prof-wlan-net] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1928564414190921">security-profile wlan-net</strong>
- [AC-wlan-vap-prof-wlan-net] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b889800077190921">ssid-profile wlan-net</strong>
- [AC-wlan-vap-prof-wlan-net] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1869922190190921">quit</strong></span></span>
- <span style="color:#333333"><span style="background-color:#dddddd">[AC-wlan-view] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b2051092768190921">ap-group name ap-group1</strong>
- [AC-wlan-ap-group-ap-group1] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1753511747190921">vap-profile wlan-net wlan 1 radio 0</strong>
- [AC-wlan-ap-group-ap-group1] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b1212706755190921">vap-profile wlan-net wlan 1 radio 1</strong>
- [AC-wlan-ap-group-ap-group1] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912351_b729861449190921">quit</strong></span></span>
射频的信道和功率自动调优功能默认开启,如果不关闭此功能则会导致手动配置不生效。举例中AP射频的信道和功率仅为示例,实际配置中请根据AP的国家码和网规结果进行配置。
- <span style="color:#333333"><span style="background-color:#dddddd">[AC-wlan-view] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912356_b1423607009190921">ap-id 0</strong>
- [AC-wlan-ap-0] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912356_b1534489953190921">radio 0</strong>
- [AC-wlan-radio-0/0] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912356_b733594144190921">calibrate auto-channel-select disable</strong>
- [AC-wlan-radio-0/0] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912356_b1154293079190921">calibrate auto-txpower-select disable</strong>
- [AC-wlan-radio-0/0] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912356_b1858200296190921">channel 20mhz 6</strong>
- Warning: This action may cause service interruption. Continue?[Y/N]<strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912356_zh-cn_task_0175818418_b1384307436190906">y</strong>
- [AC-wlan-radio-0/0] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912356_b554899294190921">eirp 127</strong>
- [AC-wlan-radio-0/0] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912356_b1779547689190921">quit</strong></span></span>
- <span style="color:#333333"><span style="background-color:#dddddd">[AC-wlan-ap-0] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912356_b33229250190921">radio 1</strong>
- [AC-wlan-radio-0/1] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912356_b327597144190921">calibrate auto-channel-select disable</strong>
- [AC-wlan-radio-0/1] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912356_b1164564697190921">calibrate auto-txpower-select disable</strong>
- [AC-wlan-radio-0/1] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912356_b201103780190921">channel 20mhz 149</strong>
- Warning: This action may cause service interruption. Continue?[Y/N]<strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912356_zh-cn_task_0175818418_b1384307436190906_1">y</strong>
- [AC-wlan-radio-0/1] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912356_b652286665190921">eirp 127</strong>
- [AC-wlan-radio-0/1] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912356_b1440636620190921">quit</strong>
- [AC-wlan-ap-0] <strong id="ZH-CN_TASK_0176912511__zh-cn_task_0176912356_b904227301190921">quit</strong></span></span>
# 开启WPA2-PSK认证方式的暴力破解密钥攻击检测功能和泛洪攻击检测功能。
- <span style="color:#333333"><span style="background-color:#dddddd">[AC-wlan-view] <strong id="ZH-CN_TASK_0176912511__b977739584190922">ap-group name ap-group1</strong>
- [AC-wlan-ap-group-ap-group1] <strong id="ZH-CN_TASK_0176912511__b840004881190922">radio 0</strong>
- [AC-wlan-group-radio-ap-group1/0] <strong id="ZH-CN_TASK_0176912511__b14531149104319">wids attack detect wpa2-psk enable</strong>
- [AC-wlan-group-radio-ap-group1/0] <strong id="ZH-CN_TASK_0176912511__b768911304517">wids attack detect flood enable</strong>
- [AC-wlan-group-radio-ap-group1/0] <strong id="ZH-CN_TASK_0176912511__b1177918651190922">quit</strong>
- [AC-wlan-ap-group-ap-group1] <strong id="ZH-CN_TASK_0176912511__b1736012676190922">radio 1</strong>
- [AC-wlan-group-radio-ap-group1/1] <strong id="ZH-CN_TASK_0176912511__b1627117111471">wids attack detect wpa2-psk enable</strong>
- [AC-wlan-group-radio-ap-group1/1] <strong id="ZH-CN_TASK_0176912511__b3119114913485">wids attack detect flood enable</strong>
- [AC-wlan-group-radio-ap-group1/1] <strong id="ZH-CN_TASK_0176912511__b630499311190922">quit</strong>
- [AC-wlan-ap-group-ap-group1] <strong id="ZH-CN_TASK_0176912511__b68507858190922">quit</strong></span></span>
# 创建WIDS模板。
<span style="color:#333333"><span style="background-color:#dddddd">[AC-wlan-view] <strong id="ZH-CN_TASK_0176912511__b203309680191210">wids-profile name default</strong></span></span>
# 配置WPA2-PSK认证方式的暴力破解密钥攻击检测的检测周期为70秒,检测周期内允许密钥错误的次数为25次,静默时间为700秒。
- <span style="color:#333333"><span style="background-color:#dddddd">[AC-wlan-wids-prof-default] <strong id="ZH-CN_TASK_0176912511__b1347713199190922">brute-force-detect interval 70</strong>
- [AC-wlan-wids-prof-default] <strong id="ZH-CN_TASK_0176912511__b2054914072190922">brute-force-detect threshold 25</strong>
- [AC-wlan-wids-prof-default] <strong id="ZH-CN_TASK_0176912511__b980686433190922">brute-force-detect quiet-time 700</strong></span></span>
# 配置泛洪攻击检测的检测周期为70秒,泛洪攻击检测阈值为350个,静默时间为700秒。
- <span style="color:#333333"><span style="background-color:#dddddd">[AC-wlan-wids-prof-default] <strong id="ZH-CN_TASK_0176912511__b1862380200190922">flood-detect interval 70</strong>
- [AC-wlan-wids-prof-default] <strong id="ZH-CN_TASK_0176912511__b151720623190922">flood-detect threshold 350</strong>
- [AC-wlan-wids-prof-default] <strong id="ZH-CN_TASK_0176912511__b484356709190922">flood-detect quiet-time 700</strong></span></span>
# 使能动态黑名单功能。
- <span style="color:#333333"><span style="background-color:#dddddd">[AC-wlan-wids-prof-default] <strong id="ZH-CN_TASK_0176912511__b4894617203">undo dynamic-blacklist disable</strong>
- [AC-wlan-wids-prof-default] <strong id="ZH-CN_TASK_0176912511__b1973602061190922">quit</strong></span></span>
# 创建名为“wlan-system”的AP系统模板,配置动态黑名单老化时间为200秒。
- <span style="color:#333333"><span style="background-color:#dddddd">[AC-wlan-view] <strong id="ZH-CN_TASK_0176912511__b1784292474190922">ap-system-profile name wlan-system</strong>
- [AC-wlan-ap-system-prof-wlan-system] <strong id="ZH-CN_TASK_0176912511__b1518148419190922">dynamic-blacklist aging-time 200</strong>
- [AC-wlan-ap-system-prof-wlan-system] <strong id="ZH-CN_TASK_0176912511__b597806412190922">quit</strong></span></span>
- <span style="color:#333333"><span style="background-color:#dddddd">[AC-wlan-view] <strong id="ZH-CN_TASK_0176912511__b388743598190922">ap-group name ap-group1</strong>
- [AC-wlan-ap-group-ap-group1] <strong id="ZH-CN_TASK_0176912511__b1950632949190922">ap-system-profile wlan-system</strong>
- [AC-wlan-ap-group-ap-group1] <strong id="ZH-CN_TASK_0176912511__b1961496138190922">quit</strong></span></span>
配置完成后,当有其他设备对WLAN网络进行攻击时,通过display wlan ids attack-detected all命令,可以查看到检测到的攻击设备。
<span style="color:#333333"><span style="background-color:#dddddd">[AC-wlan-view] <strong id="ZH-CN_TASK_0176912511__b1908231298190922">display wlan ids attack-detected all</strong> #AP: Number of monitor APs that have detected the device AT: Last detected attack type CH: Channel number act: Action frame asr: Association request aur: Authentication request daf: Deauthentication frame dar: Disassociation request wiv: Weak IV detected pbr: Probe request rar: Reassociation request eaps: EAPOL start frame eapl: EAPOL logoff frame saf: Spoofed disassociation frame sdf: Spoofed deauthentication frame otsf: Other types of spoofing frames ------------------------------------------------------------------------------- MAC address AT CH RSSI(dBm) Last detected time #AP ------------------------------------------------------------------------------- 000b-c002-9c81 pbr 165 -87 2014-11-20/15:51:13 1 0024-2376-03e9 pbr 165 -84 2014-11-20/15:51:13 1 0046-4b74-691f act 165 -67 2014-11-20/15:51:13 1 ------------------------------------------------------------------------------- Total: 3, printed: 3</span></span>
通过display wlan dynamic-blacklist all命令,可以查看加入动态黑名单的攻击设备。
<span style="color:#333333"><span style="background-color:#dddddd">[AC-wlan-view] <strong id="ZH-CN_TASK_0176912511__b1961785952190922">display wlan dynamic-blacklist all</strong> #AP: Number of monitor APs that have detected the device act: Action frame asr: Association request aur: Authentication request daf: Deauthentication frame dar: Disassociation request eapl: EAPOL logoff frame pbr: Probe request rar: Reassociation request eaps: EAPOL start frame ------------------------------------------------------------------------------- MAC address Last detected time Reason #AP LAT ------------------------------------------------------------------------------- 000b-c002-9c81 2014-11-20/16:15:53 pbr 1 100 0024-2376-03e9 2014-11-20/16:15:53 pbr 1 100 0046-4b74-691f 2014-11-20/16:15:53 act 1 100 ------------------------------------------------------------------------------- Total: 3, printed: 3 </span></span>
<span style="color:#333333"><span style="background-color:#dddddd"># sysname SwitchA # vlan batch 100 # interface GigabitEthernet0/0/1 port link-type trunk port trunk pvid vlan 100 port trunk allow-pass vlan 100 port-isolate enable group 1 # interface GigabitEthernet0/0/2 port link-type trunk port trunk allow-pass vlan 100 # return</span></span>
<span style="color:#333333"><span style="background-color:#dddddd"># sysname SwitchB # vlan batch 100 to 101 # dhcp enable # interface Vlanif101 ip address 10.23.101.1 255.255.255.0 dhcp select interface dhcp server gateway-list 10.23.101.2 # interface GigabitEthernet0/0/1 port link-type trunk port trunk allow-pass vlan 100 # interface GigabitEthernet0/0/2 port link-type trunk port trunk allow-pass vlan 100 to 101 # interface GigabitEthernet0/0/3 port link-type trunk port trunk allow-pass vlan 101 # return</span></span>
- <span style="color:#333333"><span style="background-color:#dddddd">#
- sysname Router
- #
- vlan batch 101
- #
- interface Vlanif101
- ip address 10.23.101.2 255.255.255.0
- #
- interface GigabitEthernet1/0/0
- port link-type trunk
- port trunk allow-pass vlan 101
- #
- return
- </span></span>
<span style="color:#333333"><span style="background-color:#dddddd"># sysname AC # vlan batch 100 to 101 # dhcp enable # interface Vlanif100 ip address 10.23.100.1 255.255.255.0 dhcp select interface # interface GigabitEthernet0/0/1 port link-type trunk port trunk allow-pass vlan 100 101 # capwap source interface vlanif100 # wlan security-profile name wlan-net security wpa-wpa2 psk pass-phrase %^%#m"tz0f>~7.[`^6RWdzwCy16hJj/Mc!,}s`X*B]}A%^%# aes ssid-profile name wlan-net ssid wlan-net vap-profile name wlan-net forward-mode tunnel service-vlan vlan-id 101 ssid-profile wlan-net security-profile wlan-net regulatory-domain-profile name default wids-profile name default flood-detect interval 70 flood-detect threshold 350 flood-detect quiet-time 700 brute-force-detect interval 70 brute-force-detect threshold 25 brute-force-detect quiet-time 700 ap-system-profile name wlan-system dynamic-blacklist aging-time 200 ap-group name ap-group1 ap-system-profile wlan-system wids-profile default radio 0 vap-profile wlan-net wlan 1 wids attack detect flood enable wids attack detect wpa2-psk enable radio 1 vap-profile wlan-net wlan 1 wids attack detect flood enable wids attack detect wpa2-psk enable ap-id 0 type-id 35 ap-mac 60de-4476-e360 ap-sn 210235554710CB000042 ap-name area_1 ap-group ap-group1 radio 0 channel 20mhz 6 eirp 127 calibrate auto-channel-select disable calibrate auto-txpower-select disable radio 1 channel 20mhz 149 eirp 127 calibrate auto-channel-select disable calibrate auto-txpower-select disable # return</span></span>
Copyright © 2003-2013 www.wpsshop.cn 版权所有,并保留所有权利。