Enabling Countermeasures ......................................................................................................386
Enabling AP Signatures ............................................................................................................387
IDS and DoS Alerts ..................................................................................................................388
Flood Attacks .....................................................................................................................388
DoS Attacks .......................................................................................................................388
Wireless Bridge ..................................................................................................................389
Ad-Hoc Network .................................................................................................................390
IDS Log Message Examples ............................................................................................390
Displaying Rogue Clients ...................................................................................................393
Displaying RF Detect Data.................................................................................................395
Managing System Files ................................................................................................................397
About System Files ..................................................................................................................397
Working with Files ....................................................................................................................399
Displaying a List of Files ....................................................................................................399
Copying a File ....................................................................................................................402
Deleting a File ....................................................................................................................405
Creating a Subdirectory .....................................................................................................405
Removing a Subdirectory ..................................................................................................406
D-Link DWS-1008 User Manual
xvi