427 
Figure 460 Configuring WIDS 
 
 
2.  Configure WIDS as described in Table 143. 
3.  Click Apply. 
Table 143 Configuration items  
Item Descri
tion
Flood Attack Detect 
If you select the box, flood attack detection is enabled.  
It is disabled by default. 
Spoof Attack Detect  If you select the box, spoofing attack detection is enabled. It is disabled by default.
Weak-iv Attack Detect  If you select the box, Weak IV attack detection is enabled. It is disabled by default.
 
Displaying history record 
1.  Select Security > WIDS from the navigation tree. 
2.  Click the History Record tab. 
Figure 461 Displaying history information 
 
 
Displaying statistics information 
1.  Select Security > WIDS from the navigation tree. 
2.  Click the Statistics tab.