D-Link Unified Switch CLI Command Reference
328
© 2009 D-Link Corporation. All Rights Reserved
Rogue - admin configured Rogue AP's............ Enable
Rogue - AP's on an illegal channel............. Enable
Rogue - fake managed AP / invalid channel...... Enable
Rogue - fake managed AP / no SSID.............. Enable
Rogue - managed AP / invalid SSID.............. Enable
Rogue - managed SSID / invalid security........ Enable
Rogue - standalone AP / unexpected config...... Enable
Rogue - unknown AP / managed SSID.............. Enable
Rogue - unmanaged AP on a wired network........ Enable
Rogue - unexpected WDS devices................. Enable
Rogue detected trap interval................... 60 seconds
Wired network detection interval............... 60 seconds
AP De-Authentication Attack.................... Disable
show wireless wids-security rogue-classification
This command displays the WIDS AP rogue classification test results.
Example:
The following shows example CLI display output for the command.
(DWS-4026) # show wireless wids-security 00:11:95:A3:7A:C8 rogue-classification
Test ID Detect MAC Addr (radio) Config Result 1st Report Last Report
------------- ------ -------------------- ------- ------ ----------- -----------
WIDSAPROGUE01 True 00:00:00:00:00:11(1) Enable Rogue 0d:00:00:00 0d:00:00:01
WIDSAPROGUE02 False 00:00:00:00:00:12(2) Disable 0d:00:00:00 0d:00:00:00
WIDSAPROGUE03 True 00:00:00:00:00:13(0) Enable Rogue 0d:00:00:02 0d:00:00:03
WIDSAPROGUE04 True 00:00:00:00:00:14(1) Enable Rogue 0d:00:00:04 0d:00:00:05
WIDSAPROGUE05 True 00:00:00:00:00:15(2) Enable Rogue 0d:00:00:06 0d:00:00:07
WIDSAPROGUE06 True 00:00:00:00:00:16(0) Enable Rogue 0d:00:01:28 0d:00:01:39
WIDSAPROGUE07 False 00:00:00:00:00:17(1) Enable 0d:00:01:51 0d:00:03:42
WIDSAPROGUE08 False 00:00:00:00:00:18(2) Enable 0d:00:05:33 0d:00:07:24
WIDSAPROGUE09 False 00:00:00:00:00:19(2) Enable 0d:00:09:15 0d:00:11:06
WIDSAPROGUE10 False 00:00:00:00:00:1A(0) Enable 0d:00:12:57 0d:00:14:48
To see test descriptions use
show wireless wids-security rogue-test-descriptions
.
Format
show wireless wids-security
<macaddr>
rogue-classification
Mode
Privileged EXEC
Field
Description
macaddr
MAC address of the rogue AP.
TestID
Test identifier (WIDSAPROGUEnn).
Detect
Indicates whether this test detected the condition that it is designed to detect. Possible values are
True
or
False
.
MAC Addr (radio)
The Managed AP MAC address and (radio number) last reported detecting this condition.
Config
Indicates whether this test is configured to report rogues. Possible values are
Enable
or
Disable
.
Result
Indicates whether this test reported the device as rogue (Possible values are
Rogue
or empty string.)
1st Report
Time stamp indicating how long ago this test first detected the condition.
Last Report
Time stamp indicating how long ago this test last detected the condition.
Summary of Contents for DWS-4000 Series
Page 20: ...D Link Unified Switch CLI Command Reference 12 2009 D Link Corporation All Rights Reserved ...
Page 170: ...D Link Unified Switch CLI Command Reference 162 2009 D Link Corporation All Rights Reserved ...
Page 369: ...361 Captive Portal Status Commands Locale Link The names of the languages Field Description ...
Page 416: ...D Link Unified Switch CLI Command Reference 408 2009 D Link Corporation All Rights Reserved ...
Page 528: ...D Link Unified Switch CLI Command Reference 520 2009 D Link Corporation All Rights Reserved ...
Page 545: ...537 O SSupport ...
Page 546: ...D Link Unified Switch CLI Command Reference 538 2009 D Link Corporation All Rights Reserved ...
Page 566: ...D Link Unified Switch CLI Command Reference 558 2009 D Link Corporation All Rights Reserved ...