Monitoring Rogue And Rf Scan Access Points; Table 42: Access Point Authentication Failure Status - D-Link DWS-3000 Series User Manual

Unified wired & wireless access system
Hide thumbs Also See for DWS-3000 Series:
Table of Contents

Advertisement

D-Link Unified Access System
To view additional data (beacon information) for an AP in the failure list, you can search for the MAC address of the failed
AP on the Rogue/RF Scan page. However, some APs that attempt to contact the switch on the wired network might not be
detected during the RF scan.
Field
MAC Address
IP Address
Last Failure Type
Vendor ID
Validation Failures
Authentication Failures
Protocol Version
Software Version
Hardware Type
Age
Click Back to see a list of Authentication Failed Access Points.
Click Refresh to update the screen with the most current information.

Monitoring Rogue and RF Scan Access Points

The radios on each D-Link Access Point can periodically scan the radio frequency to collect information about other APs and
wireless clients that are within range. In normal operating mode the AP always scans on the operational channel for the
radio. Two other scan modes are available for each radio on the APs:
Scan Other Channels—Configures the AP to periodically leave its operational channel and scan other channels within
that frequency.
Scan Sentry—Disables normal operation of the radio and performs a continuous radio scan. In this mode, no beacons
are sent, and no clients are allowed to associate with the AP.
When Scan Other Channels or Scan Sentry modes are enabled, the AP scans all available channels on each radio. When
the scan is complete, the AP sends information it collected during the RF scan to the switch that manages it. For information
about how to configure the scan mode, see
The D-Link Unified Switch considers an access point to be a Rogue if is detected during the RF scan process and the MAC
address of the detected AP is not in the local or RADIUS Valid AP database or if the AP is not managed by a peer switch.
To start mitigation on any Rogue Access Point, select the checkbox of the AP and click Add to Attack List.
From the Monitoring > Access Points > Rogue/RF Scan Access Points page, you can view information about all APs
detected via RF scan, including those reported as Rogues.
You can sort the APs in the list based any of the column headings. For example, to group all Rogue APs together, click
Status.
Page 138

Table 42: Access Point Authentication Failure Status

Description
The Ethernet address of the AP.
The network IP address of the AP.
Indicates the last type of failure that occurred.
Vendor of the AP software.
The count of association failures for this AP.
The count of authentication failures for this AP.
Indicates the protocol version supported by the software on the AP.
Indicates the version of software on the AP.
Hardware platform for the AP.
Time in seconds since failure occurred.
"Configuring Wireless Radio Settings" on page
Software User Manual
02/15/2011
81.
Document 34CS3000-SWUM104-D10

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Dwl-8500apDwl-3500apDwl-8600ap

Table of Contents