EasyManua.ls Logo

Ruijie RG-WLAN Series - Page 97

Ruijie RG-WLAN Series
1243 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Configuration Guide Configuring WIDS
Weak IV attack detection, detecting the weak IV packet attack.
CMCC DoS attack detection, detecting the DoS attack.
Configuration Example
N/A
2.4.3 Configuring User Isolation
Configuration Effect
After user isolation is configured, direct communication cannot be conducted between STAs meeting the user isolation
rules.
Notes
User isolation is only valid for layer-2STAs.
Configuration Steps
Configuring the User Isolation Mode
Optional.
Unless otherwise noted, configure this function on ACs.
Command
user-isolation {ap | ssid-ap } enable
Parameter
Description
ap: Indicates AP-based layer-2 user isolation.
ssid-ap: Indicates AP-SSID-based layer-2 user isolation.
Defaults
User isolation is disabled.
Command
Mode
WIDS configuration mode
Usage Guide
N/A
Configuring the Permissible MAC List for User Isolation
Optional.
Command
user-isolation permit-mac {H.H.H | max num }
Parameter
Description
H.H.H: Indicates the permissible MAC list entry for user isolation.
max num: Indicates the permissible MAC list length for user isolation ranging from 1 to 1,024.
Defaults
The permissible STA's MAC list for isolation is empty, with the default length of 1,024.
Command
Mode
WIDS configuration mode
Usage Guide
N/A
Verification
Carry out related verifications based on the isolation mode.

Table of Contents

Other manuals for Ruijie RG-WLAN Series

Related product manuals