D-Link DWC-2000-AP32-LIC User Manual - Page 71

Not Present in OUI Database

Page 71 highlights

Section 6 - Securing Your Network 2. Enable or disable the security options as desired (refer to the table below) and click Save. Field Description Not Present in OUI Database This test checks whether the MAC address of the client is from a registered Test manufacturer identified in the OUI database. Not Present in Known Client Database Test This test checks whether the client, which is identified by its MAC address, is listed in the Known Client Database and is allowed access to the AP either through the Authentication Action of Grant or through the White List global action. If the client is in the Known Client Database and has an action of Deny, or if the action is Global Action and it is globally set to Black List, the client fails this test. Configured Authentication Rate This test checks whether the client has exceeded the configured rate for transmitting Test 802.11 authentication requests. Configured Probe Requests This test checks whether the client has exceeded the configured rate for transmitting Rate Test probe requests. Configured De-Authentication This test checks whether the client has exceeded the configured rate for transmitting Requests Rate Test de‐authentication requests. Maximum Authentication Failures Test This test checks whether the client has exceeded the maximum number of failed authentications. Authentication with Unknown This test checks whether a client in the Known Client database is authenticated with AP Test an unknown AP. Client Threat Mitigation Select enable to send de‐authentication messages to clients that are in the Known Clients database but are associated with unknown APs. The Authentication with Unknown AP Test must also be enabled in order for the mitigation to take place. Select disable to allow clients in the Known Clients database to remain authenticated with an unknown AP. Known Client Database Lookup Method When the controller detects a client on the network it performs a lookup in the Known Client database. Specify whether the controller should use the local or RADIUS database for these lookups. Known Client Database Radius If the known client database lookup method is RADIUS then this field specifies the Server Name RADIUS server name. Specify the interval, in seconds, between transmissions of the SNMP trap telling the Rogue Detected Trap Interval administrator that rogue APs are present in the RF Scan database. If you set the value to 0, the trap is never sent. De-Authentication Requests Specify the number of seconds an AP should spend counting the de‐authentication Threshold Interval messages sent by wireless clients. De-Authentication Requests If the controller receives more than specified messages during the threshold interval Threshold Value the test triggers. Authentication Requests Threshold Interval Specify the number of seconds an AP should spend counting the authentication messages sent by wireless clients. Authentication Requests Threshold Value If the controller receives more than specified messages during the threshold interval the test triggers. Probe Requests Threshold Specify the number of seconds an AP should spend counting the probe messages Interval sent by wireless clients. Probe Requests Threshold Value Specify the number of probe requests a wireless client is allowed to send during the threshold interval before the event is reported as a threat. Authentication Failure Threshold Value Specify the number of 802.1X authentication failures a client is allowed to have before the event is reported as a threat. D-Link DWC-2000 User Manual 71

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282

D-Link DWC-2000 User Manual
71
Section 6 - Securing Your Network
2. Enable or disable the security options as desired (refer to the table below) and click
Save
.
Field
Description
Not Present in OUI Database
Test
This test checks whether the MAC address of the client is from a registered
manufacturer identified in the OUI database.
Not Present in Known Client
Database Test
This test checks whether the client, which is identified by its MAC address, is listed
in the Known Client Database and is allowed access to the AP either through the
Authentication Action of Grant or through the White List global action.
If the client is in the Known Client Database and has an action of Deny, or if the
action is Global Action and it is globally set to Black List, the client fails this test.
Configured Authentication Rate
Test
This test checks whether the client has exceeded the configured rate for transmitting
802.11 authentication requests.
Configured Probe Requests
Rate Test
This test checks whether the client has exceeded the configured rate for transmitting
probe requests.
Configured De-Authentication
Requests Rate Test
This test checks whether the client has exceeded the configured rate for transmitting
de‐authentication requests.
Maximum Authentication
Failures Test
This test checks whether the client has exceeded the maximum number of failed
authentications.
Authentication with Unknown
AP Test
This test checks whether a client in the Known Client database is authenticated with
an unknown AP.
Client Threat Mitigation
Select enable to send de‐authentication messages to clients that are in the Known
Clients database but are associated with unknown APs. The Authentication with
Unknown AP Test must also be enabled in order for the mitigation to take place.
Select disable to allow clients in the Known Clients database to remain authenticated
with an unknown AP.
Known Client Database Lookup
Method
When the controller detects a client on the network it performs a lookup in the
Known Client database. Specify whether the controller should use the local or
RADIUS database for these lookups.
Known Client Database Radius
Server Name
If the known client database lookup method is RADIUS then this field specifies the
RADIUS server name.
Rogue Detected Trap Interval
Specify the interval, in seconds, between transmissions of the SNMP trap telling the
administrator that rogue APs are present in the RF Scan database. If you set the
value to 0, the trap is never sent.
De-Authentication Requests
Threshold Interval
Specify the number of seconds an AP should spend counting the de‐authentication
messages sent by wireless clients.
De-Authentication Requests
Threshold Value
If the controller receives more than specified messages during the threshold interval
the test triggers.
Authentication Requests
Threshold Interval
Specify the number of seconds an AP should spend counting the authentication
messages sent by wireless clients.
Authentication Requests
Threshold Value
If the controller receives more than specified messages during the threshold interval
the test triggers.
Probe Requests Threshold
Interval
Specify the number of seconds an AP should spend counting the probe messages
sent by wireless clients.
Probe Requests Threshold Value
Specify the number of probe requests a wireless client is allowed to send during the
threshold interval before the event is reported as a threat.
Authentication Failure
Threshold Value
Specify the number of 802.1X authentication failures a client is allowed to have
before the event is reported as a threat.