Figure 448: Rogue Ap Mitigation; Figure 449: De-Authentication Attack Status - D-Link DWL-8600AP User Manual

Dws-4000 series access points
Hide thumbs Also See for DWL-8600AP:
Table of Contents

Advertisement

D-Link UWS User Manual
When the AP De-Authentication Attack is configured, the WIDS AP Rogue AP Mitigation field on the AP RF Scan
Status page shows that the mitigation is in progress.
You can also track the progress of the deauthentication attack on the WLAN > Monitoring > Access Point >
AP De-Authentication Attack Status page.
The AP deauthentication attack causes deauthentication frames to be sent to the rogue AP and to clients
communicating with the rogue AP. All clients connected to the rogue AP will experience poor connectivity. The
intent of the attack is to serve as a temporary measure until the rogue AP is located and disabled.
Note: Radios in non-sentry mode transmit deauthentication frames only on their active channel.
Therefore, D-Link recommends that you deploy radios in sentry mode to effectively implement rogue
AP deauthentication attacks.
Caution! The deauthentication attack interrupts communication between all APs designated as
rogue and their stations. Therefore, it is important to make sure all rogue APs are truly rogue before
initiating this attack.
D-Link
July 2012

Figure 448: Rogue AP Mitigation

Figure 449: De-Authentication Attack Status

Detecting and Preventing Wireless Intrusion
Unified Wired and Wireless Access System
Page 731

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents