D-Link UWS User Manual
When the AP De-Authentication Attack is configured, the WIDS AP Rogue AP Mitigation field on the AP RF Scan
Status page shows that the mitigation is in progress.
You can also track the progress of the deauthentication attack on the WLAN > Monitoring > Access Point >
AP De-Authentication Attack Status page.
The AP deauthentication attack causes deauthentication frames to be sent to the rogue AP and to clients
communicating with the rogue AP. All clients connected to the rogue AP will experience poor connectivity. The
intent of the attack is to serve as a temporary measure until the rogue AP is located and disabled.
Note: Radios in non-sentry mode transmit deauthentication frames only on their active channel.
Therefore, D-Link recommends that you deploy radios in sentry mode to effectively implement rogue
AP deauthentication attacks.
Caution! The deauthentication attack interrupts communication between all APs designated as
rogue and their stations. Therefore, it is important to make sure all rogue APs are truly rogue before
initiating this attack.
D-Link
July 2012
Figure 448: Rogue AP Mitigation
Figure 449: De-Authentication Attack Status
Detecting and Preventing Wireless Intrusion
Unified Wired and Wireless Access System
Page 731