Cisco WAP200 Administration Manual page 64

Wireless access point with power over ethernet and rangebooster
Hide thumbs Also See for WAP200:
Table of Contents

Advertisement

Configuring the WAP200 Access Point
Configuring Security Monitor Settings
STEP 3
STEP 4
Cisco WAP200 Wireless-G Access Point with Power Over Ethernet and Rangebooster
Select the types of intrusion that will be notified in the e-mail:
Rogue AP Detected— A rogue access point has been detected.
AP SSID Changed—The Access Point (AP) SSID has been changed.
Spoofed MAC Address—Another device is using the AP MAC address to
send out packets.
Client is Sending Spurious Traffic—An unassociated client is sending out
frames to the AP.
Adhoc SSID same as AP—An Adhoc network uses the same SSID as the
AP.
Adhoc Network Operating—An STA is advertising a peer-to-peer (Adhoc)
network.
Rogue Client Detected—An STA is conducting an illegal transaction with
an AP.
Default SSID in use—Default SSID is in use on an AP.
Association Table Full—An AP refused a new STA association due to
resource unavailability.
Low Speed Connection—An STA is transmitting data at a much slower rate
set by AP.
New Client Detected—A new STA is associated with an AP.
New Access Point Detected—A new AP has been detected joining the
network.
Duration Attack—A STA packet contains an abnormally large duration
value in the 802. 1 1 header.
AP is Not Using Encryption—An AP has wireless security disabled.
AP Channel Changed—An AP has changed its wireless channel.
AP Broadcasting SSID—SSID broadcasting is left enabled on an AP.
Duplicate SSID in use—An unauthorized AP has the same SSID value as an
authorized AP.
Click Save.
6
58

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents