D-Link DWS-4026 Product Manual - Page 497
Viewing WIDS Client Rogue Classification, Table 318, Detailed Detected Client Status Cont., Field
UPC - 790069325533
View all D-Link DWS-4026 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 497 highlights
Software User Manual 12/10/09 D-Link Unified Access System Table 318: Detailed Detected Client Status (Cont.) Field Description De-Auth Collection Interval Shows the amount of time spent in each de-authentication collection period. The deauthentication collection helps the switch decide whether the client is a threat. Highest De-Auth Msgs Authentication Failures Probes Detected Shows the largest number of de-authentication messages that the switch detected during a deauthentication collection interval. Shows the number of 802.1X Authentication failures detected for this client. Shows the number of probes detected in the last RF Scan. Broadcast BSSID Probes Shows the number of probes to broadcast BSSID in the last RF Scan. Broadcast SSID Probes Shows the number of probes to broadcast SSID in the last RF Scan. Specific BSSID Probes Specific SSID Probes Last Non-Broadcast BSSID Last Non-Broadcast SSID Threat Mitigation Sent Shows the number of probes to a specific BSSID in the last RF Scan. Shows the number of probes to a specific SSID in the last RF Scan Shows the last non-broadcast BSSID detected in the RF Scan, which is a MAC address. Shows the name of the last non-broadcast SSID detected in the RF Scan. Shows whether threat mitigation has been done for this client. Viewing WIDS Client Rogue Classification The Wireless Intrusion Detection System (WIDS) can help detect intrusion attempts into the wireless network and take automatic actions to protect the network. The Unified Switch allows you to activate or deactivate various threat detection tests and set threat detection thresholds. The WIDS Client Rogue Classification page provides information about the results of these tests. If a client has been classified as a rogue, this page provides information about which tests the client might have failed to trigger the classification. To view WIDS information about another client detected through the RF Scan, return to the main Detected Clients page and click the MAC address of the client with the information to view. Figure 342: WIDS Client Rogue Classification Table 319 shows information about the security test performed on the detected client. Document 34CSFP6XXUWS-SWUM100-D7 Monitoring and Managing Intrusion Detection Page 497