Visualizing The Wireless Network - D-Link DWS-4026 User Manual

Dws-4000 series unified wired & wireless access system
Table of Contents

Advertisement

Software User Manual
12/10/09
Field
Client Threat Mitigation
Known Client Database Lookup
Method
Known Client Database Radius Server
Name
Rogue Detected Trap Interval
De-Authentication Requests
Threshold Interval
De-Authentication Requests
Threshold Value
Authentication Requests Threshold
Interval
Authentication Requests Threshold
Value
Probe Requests Threshold Interval
Probe Requests Threshold Value
Authentication Failure Threshold
Value
V
ISUALIZING THE
The WLAN Visualization component is an optional feature that graphically shows information about the wireless network.
WLAN Visualization uses a Java applet to display switches, APs, and associated wireless clients. The WLAN Visualization
tool can help you visualize where the APs are in relationship to the building.
You can upload one or more custom images to create a background for the graph. Then, you place the WLAN components
discovered by the switch on the graph to help provide a realistic representation of your wireless network. From each object
on the WLAN Visualization graph, you can access information about the object and links to configuration pages on the Web
interface.
This section contains the following subsections to help you manage the WLAN Visualization component of the D-Link Unified
Switch:
Importing and Configuring a Background Image
Setting Up the Graph Components
Document
34CSFP6XXUWS-SWUM100-D7
Table 341: WIDS Client Configuration
Description
Select enable to send de-authentication messages to clients that are in the
Known Clients database but are associated with unknown APs. The
Authentication with Unknown AP Test must also be enabled in order for the
mitigation to take place.
Select disable to allow clients in the Known Clients database to remain
authenticated with an unknown AP.
When the switch detects a client on the network it performs a lookup in the
Known Client database.
Specify whether the switch should use the local or RADIUS database for
these lookups.
If the known client database lookup method is RADIUS then this field specifies
the RADIUS server name.
Specify the interval, in seconds, between transmissions of the SNMP trap
telling the administrator that rogue APs are present in the RF Scan database.
If you set the value to 0, the trap is never sent.
Specify the number of seconds an AP should spend counting the de-
authentication messages sent by wireless clients.
If switch receives more than specified messages during the threshold interval
the test triggers.
Specify the number of seconds an AP should spend counting the
authentication messages sent by wireless clients.
If switch receives more than specified messages during the threshold interval
the test triggers.
Specify the number of seconds an AP should spend counting the probe
messages sent by wireless clients.
Specify the number of probe requests a wireless client is allowed to send
during the threshold interval before the event is reported as a threat.
Specify the number of 802.1X authentication failures a client is allowed to
have before the event is reported as a threat.
W
N
IRELESS
ETWORK
D-Link Unified Access System

Visualizing the Wireless Network

Page 529

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Dwl-8600apDws-4000 series

Table of Contents