D-Link Unified Access System
•
The de-authentication attack is not effective against Ad hoc networks because these networks do not use
authentication.
•
The APs operating on channels outside of the country domain are not attacked because sending any traffic on illegal
channels is against the law.
The wireless switch maintains a list of BSSIDs against which it is conducting a de-authentication attack. The switch sends
the list of BSSIDs and channels on which the rogue APs are operating to every managed AP.
Click the MAC address of an AP in the list to access the detailed RF Scan information for the AP.
Table 328
describes the fields on the AP De-Authentication Attack Status page.
Field
BSSID
Channel
Time Since Attack Started
RF Scan Report Age
C
A
ONFIGURING
The Advanced Configuration folder contains links to the following pages:
•
Advanced Global Settings
•
Known Client
•
AP Profiles
•
Peer Switch
•
WIDS Security
A
G
DVANCED
LOBAL
The fields on the advanced Wireless Global Configuration page are settings that apply to the Unified Switch.
Page 506
Configuring Advanced Settings
Figure 351: AP De-Authentication Attack Status
Table 328: AP De-Authentication Attack Status
Description
Shows the BSSID of the AP against which the attack is launched. The BSSID
is a MAC address.
Identifies the channel on which the rogue AP is operating.
Shows the amount of time that has passed since the attack started on the AP.
Shows the amount of time that has passed since the RF Scan reported this
AP.
S
DVANCED
ETTINGS
S
ETTINGS
Software User Manual
Document 34CSFP6XXUWS-SWUM100-D7
12/10/09