D-Link DWS-1008 Cli Reference Manual page 282

8 port 10/100 wireless switch with power over ethernet
Hide thumbs Also See for DWS-1008:
Table of Contents

Advertisement

Examples: The following command shows counters for rogue activity detected by a switch:
DWS-1008# show rfdetect countermeasures
Type
------------------------------------------------------------------------------------------------------------
Rogue access points
Interfering access points
Rogue 802.11 clients
Interfering 802.11 clients
802.11 adhoc clients
Unknown 802.11 clients
Interfering 802.11 clients seen on wired network
802.11 probe request flood
802.11 authentication flood
802.11 null data flood
802.11 mgmt type 6 flood
802.11 mgmt type 7 flood
802.11 mgmt type d flood
802.11 mgmt type e flood
802.11 mgmt type f flood
802.11 association flood
802.11 reassociation flood
802.11 disassociation flood
Weak wep initialization vectors
Spoofed access point mac-address attacks
Spoofed client mac-address attacks
Ssid masquerade attacks
Spoofed deauthentication attacks
Spoofed disassociation attacks
Null probe responses
Broadcast deauthentications
FakeAP ssid attacks
FakeAP bssid attacks
Netstumbler clients
Wellenreiter clients
Active scans
Wireless bridge frames
Adhoc client frames
Access points present in attack-list
Access points not present in ssid-list
Access points not present in vendor-list
Clients not present in vendor-list
Clients added to automatic black-list
D-Link DWS-1008 CLI Manual
Current
Total
0
0
139
1116
0
0
4
347
0
1
20
965
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
12
0
0
0
0
626
11380
0
0
0
0
0
0
0
0
0
0
1796
4383
196
196
8
0
0
0
0
0
0
0
0
0
0
0


Advertisement

Table of Contents
loading

Table of Contents