Ap De-Authentication Attack Status; Table 327: Access Point Authentication Failure Details - D-Link DWS-4026 User Manual

Dws-4000 series unified wired & wireless access system
Table of Contents

Advertisement

Software User Manual
12/10/09
Field
MAC Address
IP Address
Last Failure Type
Vendor ID
Protocol Version
Software Version
Hardware Type
Reporting Switch
Switch MAC Address
Switch IP Address
Validation Failures
Authentication Failures
Age
AP D
-A
E
UTHENTICATION
The AP De-Authentication Attack Status page contains information about rogue APs that the Cluster Controller has
attacked by using the de-authentication attack feature.
The wireless switch can protect against rogue APs by sending de-authentication messages to the rogue AP. The de-
authentication attack feature must be globally enabled in order for the wireless system to do this function. Make sure that no
legitimate APs are classified as rogues before enabling the attack feature. This feature is disabled by default.
The wireless system can conduct the de-authentication attack against 16 APs at the same time. The intent of this attack is
to serve as a temporary measure until the rogue AP is located and disabled.
The de-authentication attack is not effective for all rogue types, and therefore is not used on every detected rogue. The
following rogues are not subjected to the attack:
If the detected rogue is spoofing the BSSID of the valid managed AP then the wireless system does not attempt to use
the attack because that attack may deny service to a legitimate AP and provide another avenue for a hacker to attack
the system.
Document
34CSFP6XXUWS-SWUM100-D7

Table 327: Access Point Authentication Failure Details

Description
The Ethernet address of the AP.
The network IP address of the AP.
Indicates the last type of failure that occurred, which can be one of the following:
• Local Authentication
• No Database Entry
• Not Managed
• RADIUS Authentication
• RADIUS Challenged
• RADIUS Unreachable
• Invalid RADIUS Response
• Invalid Profile ID
• Profile Mismatch-Hardware Type
Vendor of the AP software.
Indicates the protocol version supported by the software on the AP.
Indicates the version of software on the AP.
Hardware platform for the AP.
Shows whether the switch that reported the AP authentication failure is the local
switch or a peer switch.
Shows the IP address of the switch in the cluster that reported the AP
authentication failure.
Shows the MAC address of the switch in the cluster that reported the AP
authentication failure.
The count of association failures for this AP.
The count of authentication failures for this AP.
Time since failure occurred.
A
S
TTACK
TATUS
D-Link Unified Access System
Monitoring and Managing Intrusion Detection
Page 505

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Dwl-8600apDws-4000 series

Table of Contents