Configuring Advanced Settings; Advanced Global Settings; Figure 351: Ap De-Authentication Attack Status; Table 328: Ap De-Authentication Attack Status - D-Link DWS-4026 User Manual

Dws-4000 series unified wired & wireless access system
Table of Contents

Advertisement

D-Link Unified Access System
The de-authentication attack is not effective against Ad hoc networks because these networks do not use
authentication.
The APs operating on channels outside of the country domain are not attacked because sending any traffic on illegal
channels is against the law.
The wireless switch maintains a list of BSSIDs against which it is conducting a de-authentication attack. The switch sends
the list of BSSIDs and channels on which the rogue APs are operating to every managed AP.
Click the MAC address of an AP in the list to access the detailed RF Scan information for the AP.
Table 328
describes the fields on the AP De-Authentication Attack Status page.
Field
BSSID
Channel
Time Since Attack Started
RF Scan Report Age
C
A
ONFIGURING
The Advanced Configuration folder contains links to the following pages:

Advanced Global Settings

Known Client
AP Profiles
Peer Switch
WIDS Security
A
G
DVANCED
LOBAL
The fields on the advanced Wireless Global Configuration page are settings that apply to the Unified Switch.
Page 506

Configuring Advanced Settings

Figure 351: AP De-Authentication Attack Status

Table 328: AP De-Authentication Attack Status

Description
Shows the BSSID of the AP against which the attack is launched. The BSSID
is a MAC address.
Identifies the channel on which the rogue AP is operating.
Shows the amount of time that has passed since the attack started on the AP.
Shows the amount of time that has passed since the RF Scan reported this
AP.
S
DVANCED
ETTINGS
S
ETTINGS
Software User Manual
Document 34CSFP6XXUWS-SWUM100-D7
12/10/09

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Dwl-8600apDws-4000 series

Table of Contents