< Home

Verifying the Configuration of Attack Detection and Dynamic Blacklist

Context

After the WIDS configuration is complete, you can check WIDS profiles on the device, including their configuration and profile reference information, WIDS device attacking device list and dynamic blacklist.

Procedure

  • Run the display wlan ids attack-detected { all | flood | spoof | wapi-psk | weak-iv | wep-share-key | wpa-psk | wpa2-psk | mac-address mac-address } command to check information about the detected attacking devices.
  • Run the display wlan ids attack-history { all | flood | spoof | wapi-psk | weak-iv | wep-share-key | wpa-psk | wpa2-psk | mac-address mac-address } command to check historical records of the detected attacking devices.
  • Run the display wlan ids attack-detected statistics command to check statistics on the detected attacks.
  • Run the display wlan dynamic-blacklist { all | ap-id ap-id | ap-name ap-name | mac-address mac-address } command to check attacking devices added to the dynamic blacklist.
  • Run the display station dynamic-blacklist { ap-id ap-id | ap-name ap-name } command to check the dynamic blacklist.
Copyright © Huawei Technologies Co., Ltd.
Copyright © Huawei Technologies Co., Ltd.
< Previous topic Next topic >