D-Link DWS-1008 User Manual page 369

Wireless 8 port switch with poe
Hide thumbs Also See for DWS-1008:
Table of Contents

Advertisement

DWS-1008 User's Manual
DWS-1008# show rfdetect counters
Type
--------------------------------------------------
Rogue access points
Interfering access points
Rogue 802.11 clients
Interfering 802.11 clients
802.11 adhoc clients
Unknown 802.11 clients
Interfering 802.11 clients seen on wired network
802.11 probe request flood
802.11 authentication flood
802.11 null data flood
802.11 mgmt type 6 flood
802.11 mgmt type 7 flood
802.11 mgmt type d flood
802.11 mgmt type e flood
802.11 mgmt type f flood
802.11 association flood
802.11 reassociation flood
802.11 disassociation flood
Weak wep initialization vectors
Spoofed access point mac-address attacks
Spoofed client mac-address attacks
Ssid masquerade attacks
Spoofed deauthentication attacks
Spoofed disassociation attacks
Null probe responses
Broadcast deauthentications
FakeAP ssid attacks
FakeAP bssid attacks
Netstumbler clients
Wellenreiter clients
Trapeze active scans
Wireless bridge frames
Adhoc client frames
Access points present in attack-list
Access points not present in ssid-list
Access points not present in vendor-list
Clients not present in vendor-list
Clients added to automatic black-list
D-Link Systems, Inc.
Rogue Detection and Countermeasures
Current
Total
------------
------------
0
0
139
1116
0
0
4
347
0
1
20
965
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
12
0
0
0
0
626
11380
0
0
0
0
0
0
0
0
0
0
1796
4383
196
196
8
0
0
0
0
0
0
0
0
0
0
0
364

Advertisement

Table of Contents
loading

Table of Contents