Figure 460 Configuring WIDS
2.
Configure WIDS as described in
3.
Click Apply.
Table 143 Configuration items
Item
Flood Attack Detect
Spoof Attack Detect
Weak-iv Attack Detect
Displaying history record
1.
Select Security > WIDS from the navigation tree.
2.
Click the History Record tab.
Figure 461 Displaying history information
Displaying statistics information
1.
Select Security > WIDS from the navigation tree.
2.
Click the Statistics tab.
Table
143.
Description
If you select the box, flood attack detection is enabled.
It is disabled by default.
If you select the box, spoofing attack detection is enabled. It is disabled by default.
If you select the box, Weak IV attack detection is enabled. It is disabled by default.
427