D-Link DWS-1008 - AirPremier MobileLAN Switch Product Manual page 17

8 port 10/100 wireless switch with power over ethernet
Hide thumbs Also See for DWS-1008 - AirPremier MobileLAN Switch:
Table of Contents

Advertisement

Summary of Rogue Detection Features ...................................................................................380
Configuring Rogue Detection Lists ...........................................................................................381
Configuring a Permitted Vendor List ..................................................................................381
Configuring a Permitted SSID List .....................................................................................382
Configuring a Client Black List ...........................................................................................383
Configuring an Attack List ..................................................................................................384
Configuring an Ignore List ..................................................................................................385
Enabling Countermeasures ......................................................................................................386
Disabling or Reenabling Active Scan ........................................................................................387
Enabling AP Signatures ............................................................................................................387
Disabling or Reenabling Logging of Rogues ............................................................................387
Enabling Rogue and Countermeasures Notifications ...............................................................388
IDS and DoS Alerts ..................................................................................................................388
Flood Attacks .....................................................................................................................388
DoS Attacks .......................................................................................................................388
Netstumbler and Wellenreiter Applications ........................................................................389
Wireless Bridge ..................................................................................................................389
Ad-Hoc Network .................................................................................................................390
Weak WEP Key Used by Client .........................................................................................390
Disallowed Devices or SSIDs ............................................................................................390
Displaying Statistics Counters ...........................................................................................390
IDS Log Message Examples ............................................................................................390
Displaying RF Detection Information ........................................................................................392
Displaying Rogue Clients ...................................................................................................393
Displaying Rogue Detection Counters ...............................................................................394
Displaying RF Detect Data.................................................................................................395
Displaying the APs Detected by an AP Radio ..................................................................395
Displaying Countermeasures Information ..........................................................................396
Managing System Files ................................................................................................................397
About System Files ..................................................................................................................397
Displaying Software Version Information ...........................................................................397
Displaying Boot Information ...............................................................................................398
Working with Files ....................................................................................................................399
Displaying a List of Files ....................................................................................................399
Copying a File ....................................................................................................................402
Using an Image File's MD5 Checksum To Verify Its Integrity .............................................404
Deleting a File ....................................................................................................................405
Creating a Subdirectory .....................................................................................................405
Removing a Subdirectory ..................................................................................................406
Managing Configuration Files ...................................................................................................406
Displaying the Running Configuration ................................................................................406
Saving Configuration Changes ..........................................................................................408
Specifying the Configuration File to Use After the Next Reboot ........................................408
Loading a Configuration File ..............................................................................................409
Specifying a Backup Configuration File .............................................................................409
Resetting to the Factory Default Configuration ..................................................................410
Backing Up and Restoring the System .....................................................................................411
Managing Configuration Changes .....................................................................................412
D-Link DWS-1008 User Manual
xvi

Advertisement

Table of Contents
loading

Table of Contents