Configuring Advanced Settings
D-Link
Unified Wired and Wireless Access System
Oct. 2015
Page 633
D-Link UWS User Manual
Command Buttons
The page includes the following buttons:
•
Submit
—Updates the switch with the values you enter. To retain the new values across a power cycle,
you must perform a save (Tool > Save Changes).
•
Refresh
—Updates the page with the latest information.
Standalone AP with
unexpected configuration
If the AP is classified as a known standalone AP, then the switch checks
whether the AP is operating with the expected configuration parameters.
You configure the expected parameters for the standalone AP in the local or
RADIUS Valid AP database.
This test may detect network misconfiguration as well as potential intrusion
attempts.The following parameters are checked:
• Channel Number
• SSID
• Security Mode
• WDS Mode
• Presence on a wired network
Unexpected WDS device
detected on network
If the AP is classified as a Managed or Unknown AP and wireless distribution
system (WDS) traffic is detected on the AP, then the AP is considered to be
Rogue.
Only stand-alone APs that are explicitly allowed to operate in WDS mode are
not reported as rogues by this test.
Unmanaged AP detected on
wired network
This test checks whether the AP is detected on the wired network. If the AP
state is Unknown, then the test changes the AP state to Rogue. The flag
indicating whether AP is detected on the wired network is reported as part of
the RF Scan report. If AP is managed and is detected on the network then the
switch simply reports this fact and doesn't change the AP state to Rogue.
In order for the wireless system to detect this threat, the wireless network
must contain one or more radios that operate in sentry mode.
Rogue Detected Trap Interval
Specify the interval, in seconds, between transmissions of the SNMP trap
telling the administrator that rogue APs are present in the RF Scan database.
If you set the value to 0, the trap is never sent.
Wired Network Detection
Interval
Specify the number of seconds that the AP waits before starting a new wired
network detection cycle. If you set the value to 0, wired network detection is
disabled.
AP De-Authentication Attack
Enable or disable the AP de-authentication attack.
The wireless switch can protect against rogue APs by sending de-
authentication messages to the rogue AP. The de-authentication attack
feature must be globally enabled in order for the wireless system to do this
function. Make sure that no legitimate APs are classified as rogues before
enabling the attack feature. This feature is disabled by default.
Table 362: WIDS AP Configuration (Cont.)
Field
Description
Summary of Contents for DWL-8600AP
Page 754: ......