Verifying the Attack Detection and Dynamic Blacklist Configuration
Context
After the WIDS configuration is complete, you can check WIDS profiles on the device, including their configuration
and profile reference information, WIDS device attacking device
list and dynamic blacklist.
Procedure
Run the display wids-profile { all | nameprofile-name } command to check information about the WIDS profile.
Run the display
references wids-whitelist-profilenameprofile-name command to check reference information
about the WIDS whitelist profile.
Run the display ap-system-profile { all | nameprofile-name } command to check the configuration
of the AP system profile.