Verifying the WIDS Configuration
Context
After the WIDS configuration is complete, you can check WIDS profiles on the device, including their configuration and profile reference information, attacking device list, and dynamic blacklist.
Procedure
- Check the configuration and reference information about the WIDS
profile.
Run the display wids-profile { all | name profile-name } command to check information about the WIDS profile.
Run the display references wids-profile name profile-name command to check reference information about the WIDS profile.
- Check the WIDS attack detection results and devices added
to the dynamic blacklist.
Run the display wlan ids attack-detected { all | flood | spoof | wapi-psk | weak-iv | wep-share-key | wpa-psk | wpa2-psk | mac-address mac-address } command to check information about the detected attacking devices.
Run the display wlan ids attack-history { all | flood | spoof | wapi-psk | weak-iv | wep-share-key | wpa-psk | wpa2-psk | mac-address mac-address } command to check historical records of the detected attacking devices.
Run the display wlan ids attack-detected statistics command to check statistics on the detected attacks.
Run the display wlan ids dynamic-blacklist { all | ap-id ap-id | ap-name ap-name | mac-address mac-address } command to check attacking devices added to the dynamic blacklist.
Run the display station dynamic-blacklist { ap-id ap-id | ap-name ap-name } command to check the dynamic blacklist.