Motorola WiNG 5.6 Reference Manual page 966

Access point
Table of Contents

Advertisement

14 - 4
WiNG 5.6 Access Point System Reference Guide
AP AP_AUTOUP_DONE 5 AUTOUPGRADE: [str] mac
[str] Autoupgrade complete
AP AP_AUTOUP_FAIL 4 AUTOUPGRADE: [str] mac [str]
Autoupgrade failed
AP AP_AUTOUP_VER 6 AUTOUPGRADE: version [str]
available for [str] equipment
AAA RADIUS_DISCON_MSG Received Radius dynamic
authorization Disconnect Message for [qstr] from server
[qstr]
AAA RADIUS_VLAN_UPDATE6 Assigning Radius server
specified vlan [uint] to client [qstr] on wlan [qstr]
AAA RADIUS_SESSION_NOT_STARTED5 Radius
server indicates session time has not started for client
[qstr]
AAA RADIUS_SESSION_EXPIRED5 Radius server indicates
session has already expired for client [qstr]
ADV-WIPS ADV-WIPS-EVENT-1 4 Detected DoS
Deauthentication attack against [mac] [str]
ADV-WIPS ADV-WIPS-EVENT-2 4 Detected DoS
Disassociation attack against [mac] [str]
ADV-WIPS ADV-WIPS-EVENT-3 4 Detected DoS EAP
failure spoof attack by [mac] [str]
ADV-WIPS ADV-WIPS-EVENT-10 4 Detected ID-Theft
out of sequence attack for [mac] [str]
ADV-WIPS ADV-WIPS-EVENT-11 4 Detected possible
ID-Theft EAPoL Success spoof attack by [mac] [str]
ADV-WIPS ADV-WIPS-EVENT-12 4 Detected possible
WLAN-Jack attack by [mac] [str]
ADV-WIPS ADV-WIPS-EVENT-13 4 Detected possible
ESSID-Jack attack against [mac] [str]
ADV-WIPS ADV-WIPS-EVENT-14 4 Detected possible
Monkey-Jack attack by [mac] [str]
ADV-WIPS ADV-WIPS-EVENT-16 4 Detected possible
NULL Probe Response attack by [mac] [str]
ADV-WIPS ADV-WIPS-EVENT-105 4 Sanctioned MU
[mac] detected associated with unsanctioned/
neighboring AP [str]
ADV-WIPS ADV-WIPS-EVENT-109 4 Multicast all
systems traffic found from [mac] [str]
Auto upgrade successful
Failed auto upgrade attempt
Available access point firmware versions for auto upgrade
Received RADIUS disconnect request
Client VLAN updated by RADIUS
Start time from RADIUS resource not yet valid
Session time from RADIUS resource already expired
DoS Deauthentication attack
DoS disassociation attack
EAP failure spoof attack
ID theft out of sequence attack
Possible ID theft EAPoL success spoof attack
Possible WLAN jack attack
Possible ESSID jack attack
Possible monkey jack attack
Possible NULL probe response attack
Sanctioned MU detected associated with
unsanctioned/neighboring AP
Multicast all systems traffic

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents