Figure 6-14: Security Monitor - Alerts Summary; Figure 6-15: Security Monitor - Pop-Up Alert - Linksys WUSB200 User Manual

Business series wireless-g business usb network adapter with rangebooster
Hide thumbs Also See for WUSB200:
Table of Contents

Advertisement

Wireless-G Business USB Network Adapter with RangeBooster
Alert
Overview
Both the WAP200 Access Point and client USB Network Adapter monitor the state of your wireless network and
report on security related issues, ranging from on-going attacks down to vulnerabilities in the network
configuration.
The Access Point does most of the security monitoring work while the client Notebook Adapter can detect new
and rogue access points. The management software runs on the client PC, which allows the system
administrator to perform initial setup of security profiles and classification of the wireless network devices.
When a client Notebook Adapter detects an unknown access point, it will notify its associated Access Point. The
Access Points synchronize security alerts with each other and send the alert to the administrator.
Once the administrator is alerted with the security alarm, the administrator or one of the five authorized users
can log in to the Security Monitor to retrieve the Alert Log from the Access Point.
There are four categories of policy violation rules listed under Alert Type: Intrusion Alarms: unauthorized
connection or hacking attack taking place on the network, Denial of Service Alarms: denial of service attack
detected on the network, Vulnerability Alarms: potential threat to the security of the network, and Others. Each
represents a different kind of threat to the wireless network, ranging from poor performance to unauthorized
users connected to the network. A violation will be listed under Amount. You can click Retrieve Alert log to view
the Alert List. When Detail is clicked, the Details screen appears with more detailed information of the event, then
you can click Advice to view the suggested advice for the event.
Alerts Summary
The Alerts Summary screen lists the alert types, amount of alerts, and available details.
Detail - Click the Detail button to view more detailed information for each event.

Figure 6-14: Security Monitor - Alerts Summary

Receive Alert logs - Select this to receive alert logs from access points.
Retrieve Alert log - Click this button to view an alert log.
Enable Pop-up - Select this to allow this client to receive a pop-up warning message when a new access point
or client is detected.
Click Back to go to the previous screen.

Figure 6-15: Security Monitor - POP-UP Alert

Chapter 6: The Administrative Functions in the Wireless Network Monitor
51
Security Monitor

Advertisement

Table of Contents
loading

Table of Contents