D-Link DWS-1008 User Manual
xvi
Summary of Rogue Detection Features
...................................................................................
380
Configuring Rogue Detection Lists
...........................................................................................
381
Configuring a Permitted Vendor List
..................................................................................
381
Configuring a Permitted SSID List
.....................................................................................
382
Configuring a Client Black List
...........................................................................................
383
Configuring an Attack List
..................................................................................................
384
Configuring an Ignore List
..................................................................................................
385
Enabling Countermeasures
......................................................................................................
386
Disabling or Reenabling Active Scan
........................................................................................
387
Enabling AP Signatures
............................................................................................................
387
Disabling or Reenabling Logging of Rogues
............................................................................
387
Enabling Rogue and Countermeasures Notifications
...............................................................
388
IDS and DoS Alerts
..................................................................................................................
388
Flood Attacks
.....................................................................................................................
388
DoS Attacks
.......................................................................................................................
388
Netstumbler and Wellenreiter Applications
........................................................................
389
Wireless Bridge
..................................................................................................................
389
Ad-Hoc Network
.................................................................................................................
390
Weak WEP Key Used by Client
.........................................................................................
390
Disallowed Devices or SSIDs
............................................................................................
390
Displaying Statistics Counters
...........................................................................................
390
IDS Log Message Examples
............................................................................................
390
Displaying RF Detection Information
........................................................................................
392
Displaying Rogue Clients
...................................................................................................
393
Displaying Rogue Detection Counters
...............................................................................
394
Displaying RF Detect Data
.................................................................................................
395
Displaying the APs Detected by an AP Radio
..................................................................
395
Displaying Countermeasures Information
..........................................................................
396
Managing System Files
................................................................................................................
397
About System Files
..................................................................................................................
397
Displaying Software Version Information
...........................................................................
397
Displaying Boot Information
...............................................................................................
398
Working with Files
....................................................................................................................
399
Displaying a List of Files
....................................................................................................
399
Copying a File
....................................................................................................................
402
Using an Image File’s MD5 Checksum To Verify Its Integrity
.............................................
404
Deleting a File
....................................................................................................................
405
Creating a Subdirectory
.....................................................................................................
405
Removing a Subdirectory
..................................................................................................
406
Managing Configuration Files
...................................................................................................
406
Displaying the Running Configuration
................................................................................
406
Saving Configuration Changes
..........................................................................................
408
Specifying the Configuration File to Use After the Next Reboot
........................................
408
Loading a Configuration File
..............................................................................................
409
Specifying a Backup Configuration File
.............................................................................
409
Resetting to the Factory Default Configuration
..................................................................
410
Backing Up and Restoring the System
.....................................................................................
411
Managing Configuration Changes
.....................................................................................
412