D-Link DWS-4026 Product Manual - Page 506
Configuring Advanced Settings, Advanced Global Settings
UPC - 790069325533
View all D-Link DWS-4026 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 506 highlights
D-Link Unified Access System Software User Manual 12/10/09 • The de-authentication attack is not effective against Ad hoc networks because these networks do not use authentication. • The APs operating on channels outside of the country domain are not attacked because sending any traffic on illegal channels is against the law. The wireless switch maintains a list of BSSIDs against which it is conducting a de-authentication attack. The switch sends the list of BSSIDs and channels on which the rogue APs are operating to every managed AP. Click the MAC address of an AP in the list to access the detailed RF Scan information for the AP. Figure 351: AP De-Authentication Attack Status Table 328 describes the fields on the AP De-Authentication Attack Status page. Field BSSID Channel Time Since Attack Started RF Scan Report Age Table 328: AP De-Authentication Attack Status Description Shows the BSSID of the AP against which the attack is launched. The BSSID is a MAC address. Identifies the channel on which the rogue AP is operating. Shows the amount of time that has passed since the attack started on the AP. Shows the amount of time that has passed since the RF Scan reported this AP. CONFIGURING ADVANCED SETTINGS The Advanced Configuration folder contains links to the following pages: • Advanced Global Settings • Known Client • AP Profiles • Peer Switch • WIDS Security ADVANCED GLOBAL SETTINGS The fields on the advanced Wireless Global Configuration page are settings that apply to the Unified Switch. Page 506 Configuring Advanced Settings Document 34CSFP6XXUWS-SWUM100-D7