D-Link DWS-4026 Product Manual - Page 529
Visualizing the Wireless Network, Known Client Database Radius Server
UPC - 790069325533
View all D-Link DWS-4026 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 529 highlights
Software User Manual 12/10/09 D-Link Unified Access System Table 341: WIDS Client Configuration Field Description Client Threat Mitigation Known Client Database Lookup Method Select enable to send de-authentication messages to clients that are in the Known Clients database but are associated with unknown APs. The Authentication with Unknown AP Test must also be enabled in order for the mitigation to take place. Select disable to allow clients in the Known Clients database to remain authenticated with an unknown AP. When the switch detects a client on the network it performs a lookup in the Known Client database. Specify whether the switch should use the local or RADIUS database for these lookups. Known Client Database Radius Server Name Rogue Detected Trap Interval De-Authentication Requests Threshold Interval If the known client database lookup method is RADIUS then this field specifies the RADIUS server name. Specify the interval, in seconds, between transmissions of the SNMP trap telling the administrator that rogue APs are present in the RF Scan database. If you set the value to 0, the trap is never sent. Specify the number of seconds an AP should spend counting the deauthentication messages sent by wireless clients. De-Authentication Requests Threshold Value Authentication Requests Threshold Interval If switch receives more than specified messages during the threshold interval the test triggers. Specify the number of seconds an AP should spend counting the authentication messages sent by wireless clients. Authentication Requests Threshold Value If switch receives more than specified messages during the threshold interval the test triggers. Probe Requests Threshold Interval Probe Requests Threshold Value Authentication Failure Threshold Value Specify the number of seconds an AP should spend counting the probe messages sent by wireless clients. Specify the number of probe requests a wireless client is allowed to send during the threshold interval before the event is reported as a threat. Specify the number of 802.1X authentication failures a client is allowed to have before the event is reported as a threat. VISUALIZING THE WIRELESS NETWORK The WLAN Visualization component is an optional feature that graphically shows information about the wireless network. WLAN Visualization uses a Java applet to display switches, APs, and associated wireless clients. The WLAN Visualization tool can help you visualize where the APs are in relationship to the building. You can upload one or more custom images to create a background for the graph. Then, you place the WLAN components discovered by the switch on the graph to help provide a realistic representation of your wireless network. From each object on the WLAN Visualization graph, you can access information about the object and links to configuration pages on the Web interface. This section contains the following subsections to help you manage the WLAN Visualization component of the D-Link Unified Switch: • Importing and Configuring a Background Image • Setting Up the Graph Components Document 34CSFP6XXUWS-SWUM100-D7 Visualizing the Wireless Network Page 529