< Home

Verifying the Attack Detection and Dynamic Blacklist Configuration

Context

After the WIDS configuration is complete, you can check WIDS profiles on the device, including their configuration and profile reference information, WIDS device attacking device list and dynamic blacklist.

Procedure

  • Run the display wids-profile { all | name profile-name } command to check information about the WIDS profile.
  • Run the display references wids-whitelist-profile name profile-name command to check reference information about the WIDS whitelist profile.
  • Run the display ap-system-profile { all | name profile-name } command to check the configuration of the AP system profile.
Copyright © Huawei Technologies Co., Ltd.
Copyright © Huawei Technologies Co., Ltd.
< Previous topic