D-Link DWC-2000-AP32-LIC User Manual - Page 69

Securing Your Network

Page 69 highlights

Section 6 - Securing Your Network Field Unexpected WDS Device Detection on Network Unmanaged AP Detection on Wired Network Rogue Detected Trap Interval Wired Network Detection Interval AP De-Authentication Attack Description If the AP is classified as a Managed or Unknown AP and wireless distribution system (WDS) traffic is detected on the AP, then the AP is considered to be Rogue. Only stand‐ alone APs that are explicitly allowed to operate in WDS mode are not reported as rogues by this test. This test checks whether the AP is detected on the wired network. If the AP state is Unknown, then the test changes the AP state to Rogue. The flag indicating whether AP is detected on the wired network is reported as part of the RF Scan report. If AP is managed and is detected on the network then the controller simply reports this fact and doesn't change the AP state to Rogue. In order for the wireless system to detect this threat, the wireless network must contain one or more radios that operate in sentry mode. Specify the interval, in seconds, between transmissions of the SNMP trap telling the administrator that rogue APs are present in the RF Scan database. If you set the value to 0, the trap is never sent. Specify the number of seconds that the AP waits before starting a new wired network detection cycle. If you set the value to 0, wired network detection is disabled. Enable or disable the AP de‐authentication attack. The wireless controller can protect against rogue APs by sending de‐authentication messages to the rogue AP. The de‐ authentication attack feature must be globally enabled in order for the wireless system to do this function. Make sure that no legitimate APs are classified as rogues before enabling the attack feature. This feature is disabled by default. D-Link DWC-2000 User Manual 69

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282

D-Link DWC-2000 User Manual
69
Section 6 - Securing Your Network
Field
Description
Unexpected WDS Device
Detection on Network
If the AP is classified as a Managed or Unknown AP and wireless distribution system
(WDS) traffic is detected on the AP, then the AP is considered to be Rogue. Only stand‐
alone APs that are explicitly allowed to operate in WDS mode are not reported as
rogues by this test.
Unmanaged AP Detection on
Wired Network
This test checks whether the AP is detected on the wired network. If the AP state is
Unknown, then the test changes the AP state to Rogue. The flag indicating whether
AP is detected on the wired network is reported as part of the RF Scan report. If AP is
managed and is detected on the network then the controller simply reports this fact
and doesn’t change the AP state to Rogue. In order for the wireless system to detect
this threat, the wireless network must contain one or more radios that operate in sentry
mode.
Rogue Detected Trap Interval
Specify the interval, in seconds, between transmissions of the SNMP trap telling the
administrator that rogue APs are present in the RF Scan database. If you set the value
to 0, the trap is never sent.
Wired Network Detection
Interval
Specify the number of seconds that the AP waits before starting a new wired network
detection cycle. If you set the value to 0, wired network detection is disabled.
AP De-Authentication Attack
Enable or disable the AP de‐authentication attack. The wireless controller can protect
against rogue APs by sending de‐authentication messages to the rogue AP. The de‐
authentication attack feature must be globally enabled in order for the wireless system
to do this function. Make sure that no legitimate APs are classified as rogues before
enabling the attack feature. This feature is disabled by default.