D-Link DWS-1008 - AirPremier MobileLAN Switch Product Manual page 410

8 port 10/100 wireless switch with power over ethernet
Hide thumbs Also See for DWS-1008 - AirPremier MobileLAN Switch:
Table of Contents

Advertisement

Message Type
Null data message flood
Management frame 6 flood
Management frame 7 flood
Management frame D flood
Management frame E flood
Management frame F flood
Associate request flood
Reassociate request flood
Disassociate request flood
Weak WEP initialization vector (IV)
Decrypt errors
Spoofed deauthentication frames
Spoofed disassociation frames
Null probe responses
Broadcast deauthentications
Fake AP SSID (when source MAC address is known)
Fake AP SSID (when source MAC address is not known)
Spoofed SSID
D-Link DWS-1008 User Manual
Example Log Message
Client aa:bb:cc:dd:ee:ff is sending null data message flood.
Seen by AP on port 2, radio 1 on channel 11 with RSSI
-53.
Client aa:bb:cc:dd:ee:ff is sending rsvd mgmt frame 6
message flood. Seen by AP on port 2, radio 1 on channel
11 with RSSI -53.
Client aa:bb:cc:dd:ee:ff is sending rsvd mgmt frame 7
message flood. Seen by AP on port 2, radio 1 on channel
11 with RSSI -53.
Client aa:bb:cc:dd:ee:ff is sending rsvd mgmt frame D
message flood. Seen by AP on port 2, radio 1 on channel
11 with RSSI -53.
Client aa:bb:cc:dd:ee:ff is sending rsvd mgmt frame E
message flood. Seen by AP on port 2, radio 1 on channel
11 with RSSI -53.
Client aa:bb:cc:dd:ee:ff is sending rsvd mgmt frame F
message flood. Seen by AP on port 2, radio 1 on channel
11 with RSSI -53.
Client aa:bb:cc:dd:ee:ff is sending associate request flood
on port 2
Client aa:bb:cc:dd:ee:ff is sending re-associate request
flood on port 2
Client aa:bb:cc:dd:ee:ff is sending disassociate request
flood on port 2
Client aa:bb:cc:dd:ee:ff is using weak wep initialization
vector. Seen by AP on port 2, radio 1 on channel 11 with
RSSI -53.
Client aa:bb:cc:dd:ee:ff is sending packets with decrypt
errors. Seen by AP on port 2, radio 1 on channel 11 with
RSSI -53.
Deauthentication frame from AP aa:bb:cc:dd:ee:ff is being
spoofed. Seen by AP on port 2, radio 1 on channel 11 with
RSSI -53.
Disassociation frame from AP aa:bb:cc:dd:ee:ff is being
spoofed. Seen by AP on port 2, radio 1 on channel 11 with
RSSI -53.
AP aa:bb:cc:dd:ee:ff is sending null probe responses.
Seen by AP on port 2, radio 1 on channel 11 with RSSI
-53.
AP aa:bb:cc:dd:ee:ff is sending broadcast deauthentications.
Seen by AP on port 2, radio 1 on channel 11 with RSSI -
53.
FakeAP SSID attack detected from aa:bb:cc:dd:ee:ff. Seen
by AP on port 2, radio 1 on channel 11 with RSSI -53 SSID
myssid.
FakeAP BSSID attack detected. Seen by AP on port 2, radio
1 on channel 11 with RSSI -53 SSID myssid.
AP Mac aa:bb:cc:dd:ee:ff(ssid myssid) is masquerading our
ssid used by aa:bb:cc:dd:ee:fd. Detected by listener aa:bb:
cc:dd:ee:fc(port 2, radio 1), channel 11 with RSSI -53.
1

Advertisement

Table of Contents
loading

Table of Contents