The Security Monitor - Event Log Tab; Figure 6-21: Security Monitor - Event Log - Linksys SRW224P - 10/100 - Gigabit Switch User Manual

Business series wireless-g access point with power over ethernet and rangebooster
Hide thumbs Also See for SRW224P - 10/100 - Gigabit Switch:
Table of Contents

Advertisement

Wireless-G Access Point with Power Over Ethernet and Rangebooster

The Security Monitor - Event Log Tab

Configure the event logging options for security monitor.
E-mail Notification
Recipient To. Enter the e-mail address that the alarm notifications should be sent to.
Alarm Type. Select the type of intrusions that should require an e-mail notification.
• Rogue AP Detected. Indicates a rogue access point has been detected.
• AP SSID Changed. Indicates the Access Point's SSID has been changed.
• Spoofed MAC Address. Indicates another device is using the AP's MAC address to send out packets.
• Client is Sending Spurious Traffic. Indicates an unassociated client is sending out frames to the AP.
• Adhoc SSID same as AP. Indicates an Adhoc network uses the same SSID as the AP.
• Adhoc Network Operating. Indicates when a STA is advertising a peer-to-peer (Adhoc) network.
• Rogue Client Detected. Indicates when a STA is conducting an illegal transaction with an AP.
• Default SSID in use. Indicates when the default SSID is in use on an AP.
• Association Table Full. Indicates an AP refused a new STA association due to resource unavailability.
• Low Speed Connection. Indicates when a STA is transmitting data at a much slower rate set by AP.
• New Client Detected. Indicates a new STA is associated with an AP.
• New Access Point Detected. Indicates a new AP has been detected joining the network.
• Duration Attack. Indicates a STA packet contains an abnormally large duration value in the 802.11
header.
• AP is Not Using Encryption. Indicates when an AP has wireless security disabled.
• AP Channel Changed. Indicates when an AP changes its wireless channel.
• AP Broadcasting SSID. Indicates when SSID broadcasting is enabled on an AP.
Chapter 6: Configuring the Wireless-G Access Point
The Security Monitor - Event Log Tab

Figure 6-21: Security Monitor - Event Log

32

Advertisement

Table of Contents
loading

Table of Contents