D-Link DWC-1000 User Manual - Page 292

Known Client Database RADIUS Server Name

Page 292 highlights

Wireless Controller User Manual Known Cl i ent Databas e Look up Method: W h en t h e co n t ro ller d et ect s a clien t o n t h e n et wo rk it p erfo rms a lo o ku p in t h e Kn o wn Clien t d at ab as e. Sp ecify wh et h er the controller s hould us e the local or RADIUS databas e for thes e lookups . Known Cl i ent Databas e RADIUS S erver Name : If t h e kn o wn clien t d at ab as e lo o ku p met h o d is RA DIUS t h en t h is field s p e cifies t h e RA DIUS s erv er n ame. Rog ue Detected Trap Interval : Sp ecify t h e in t erv al, in s eco n d s , b et ween t ran s mis sio ns o f t h e SNM P t rap t ellin g t h e admin is t rator t h at ro g ue A Ps are p resent in the RF Scan databas e. If you s et the value to 0, the trap is never s ent. De-Authenti cati on Reques ts Thres hol d Interval : Sp ecify t h e n u mb er o f s eco n d s an A P s h o u ld s p en d co u n t in g t h e DE au t h en t icat io n mes s ag es s en t b y wireles s clients . De-Authenti cati on Reques ts Thres hol d Val ue: If co n t ro ller receiv es mo re t h an s p ecified mes s ag es d u rin g t h e t h res h o ld in t erv al t h e t es t t rig g ers . Authenti cati on Reques ts Thres hol d Interval : Sp ecify t h e n u mb er o f s eco n d s an A P s h o u ld s pen d co u n t in g t h e au t h en t icat io n mes s ag es s en t b y wireles s clien t s . Authenti cati on Reques ts Thres hol d Val ue : If co n t ro ller receiv es mo re t h an s p ecified mes s ages d u ring t he t h resh old in t erv al t h e t es t t rig g ers . Pro b e Req u es t s Th res h old In t erval Sp ecify t h e n umb er o f s econ ds an A P s ho uld sp en d co un tin g t h e p ro b e mes s ag es s en t b y wireles s clien t s . Probe Reques ts Thre s hol d Val ue : Sp ecify t h e n u mb er o f p ro b e req u ests a wireless client is allowed to s end during the threshold interval before the event is reported as a threat. Authenti cati on Fai l ure Thres hol d Val ue : Sp ecify t h e n u mb er o f 802.1X authentication failures a client is allowed to have before the event is reported as a threat. 290

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324

Wireless Controller
User Manual
290
Known Client Database Lookup Method
: When the controller detects a client on
the network it performs a lookup in the Known Client database. Specify whether
the controller should use the local or RADIUS database for these lookups.
Known Client Database RADIUS Server Name
: If the known client database
lookup method is RADIUS then this field specifies the RADIUS server name.
Rogue Detected Trap Interval
: Specify the interval, in seconds, between
transmissions of the SNMP trap telling the administrator that rogue APs are present
in the RF Scan database. If you set the value to 0, the trap is never sent.
De-Authentication Requests Threshold Interval
: Specify the number of seconds
an AP should spend counting the DE authentication messages sent by wireless
clients.
De-Authentication Requests Threshold Value:
If controller receives more than
specified messages during the threshold interval the test triggers.
Authentication Requests Threshold Interval
: Specify the number of seconds an
AP should spend counting the authentication messages sent by wireless clients.
Authentication Requests Threshold Value
: If controller receives more than
specified messages during the threshold interval the test triggers. Probe Requests
Threshold Interval Specify the number of seconds an AP should spend counting the
probe messages sent by wireless clients.
Probe Requests Threshold Value
: Specify the number of probe requests a wireless
client is allowed to send during the threshold interval before the event is reported
as a threat.
Authentication Failure Threshold Value
: Specify the number of 802.1X
authentication failures a client is allowed to have before the event is reported as a
threat.