Configuration Guide Configuring WIDS
Weak IV attack detection, detecting the weak IV packet attack.
CMCC DoS attack detection, detecting the DoS attack.
Configuration Example
N/A
2.4.3 Configuring User Isolation
Configuration Effect
After user isolation is configured, direct communication cannot be conducted between STAs meeting the user isolation
rules.
Notes
User isolation is only valid for layer-2STAs.
Configuration Steps
Configuring the User Isolation Mode
Optional.
Unless otherwise noted, configure this function on ACs.
user-isolation {ap | ssid-ap } enable
ap: Indicates AP-based layer-2 user isolation.
ssid-ap: Indicates AP-SSID-based layer-2 user isolation.
User isolation is disabled.
Configuring the Permissible MAC List for User Isolation
Optional.
user-isolation permit-mac {H.H.H | max num }
H.H.H: Indicates the permissible MAC list entry for user isolation.
max num: Indicates the permissible MAC list length for user isolation ranging from 1 to 1,024.
The permissible STA's MAC list for isolation is empty, with the default length of 1,024.
Verification
Carry out related verifications based on the isolation mode.