D-Link DWS-4026 Product Manual - Page 493
Rogue/RF, WIDS AP Rogue Classification, MAC Address, Test Description, Condition Detected
UPC - 790069325533
View all D-Link DWS-4026 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 493 highlights
Software User Manual 12/10/09 D-Link Unified Access System These changes can be done without disrupting network connectivity. Since some of the work is done by access points, the switch needs to send messages to the APs to modify its WIDS operational properties. To view information about another AP detected through the RF Scan, return to the main Rogue/RF Scan page and click the MAC address of the AP with the information to view. Figure 339: WIDS AP Rogue Classification Table 316 shows the information the WIDS AP Rogue Classification page shows for an individual access point. Field MAC Address Test Description Condition Detected Reporting MAC Address Radio Test Config Table 316: WIDS AP Rogue Classification Description The Ethernet MAC address of the detected AP. This could be a physical radio interface or VAP MAC. For D-Link APs this is always a VAP MAC address. Identifies the tests that were performed, which includes the following: • Administrator-Configured rogue AP • Managed SSID received form an unknown AP • Managed SSID received from an AP without SSID • Beacon Received from a fake managed AP on a invalid channel • Managed SSID detected with incorrect security configuration • Invalid SSID received from managed AP. • AP is operating on an illegal channel • Standalone AP is operating with unexpected configuration. • Unexpected WDS device is detected on the network. • Unmanaged AP detected on wired network. Indicates whether the result of the test was true or false. Identifies the MAC address of the AP that reported the test results. Identifies which physical radio on the reporting AP was responsible for the test results. Shows whether this test is configured to report rogues. Each test can be globally enabled or disabled to report a positive result as a rogue. Document 34CSFP6XXUWS-SWUM100-D7 Monitoring and Managing Intrusion Detection Page 493