Verifying the Configuration of Attack Detection and Dynamic Blacklist
Context
After the WIDS configuration is complete, you can check WIDS profiles on the device, including their configuration and profile reference information, WIDS device attacking device list and dynamic blacklist.
Procedure
Run the display wlan ids attack-detected { all | flood | spoof | wapi-psk | weak-iv | wep-share-key | wpa-psk | wpa2-psk | mac-addressmac-address } command to check
information about the detected attacking devices.
Run the display wlan ids attack-history { all | flood | spoof | wapi-psk | weak-iv | wep-share-key | wpa-psk | wpa2-psk | mac-addressmac-address } command to check
historical records of the detected attacking devices.
Run the display wlan ids attack-detected statistics command to check statistics on the detected attacks.
Run the display wlan dynamic-blacklist { all | ap-idap-id | ap-nameap-name | mac-addressmac-address } command to check attacking devices added to the dynamic blacklist.
Run the display station dynamic-blacklist { ap-idap-id | ap-nameap-name } command to check the dynamic blacklist.