
Software User Manual
D-Link Unified Access System
12/10/09
Document
34CSFP6XXUWS-SWUM100-D7
Monitoring and Managing Intrusion Detection
Page 493
These changes can be done without disrupting network connectivity. Since some of the work is done by access points, the
switch needs to send messages to the APs to modify its WIDS operational properties.
To view information about another AP detected through the RF Scan, return to the main
Rogue/RF
Scan page and click the
MAC address of the AP with the information to view.
Figure 339: WIDS AP Rogue Classification
shows the information the WIDS AP Rogue Classification page shows for an individual access point.
Table 316: WIDS AP Rogue Classification
Field
Description
MAC Address
The Ethernet MAC address of the detected AP. This could be a physical radio interface or VAP
MAC. For D-Link APs this is always a VAP MAC address.
Test Description
Identifies the tests that were performed, which includes the following:
•
Administrator-Configured rogue AP
•
Managed SSID received form an unknown AP
•
Managed SSID received from an AP without SSID
•
Beacon Received from a fake managed AP on a invalid channel
•
Managed SSID detected with incorrect security configuration
•
Invalid SSID received from managed AP.
•
AP is operating on an illegal channel
•
Standalone AP is operating with unexpected configuration.
•
Unexpected WDS device is detected on the network.
•
Unmanaged AP detected on wired network.
Condition Detected
Indicates whether the result of the test was true or false.
Reporting MAC
Address
Identifies the MAC address of the AP that reported the test results.
Radio
Identifies which physical radio on the reporting AP was responsible for the test results.
Test Config
Shows whether this test is configured to report rogues. Each test can be globally enabled or
disabled to report a positive result as a rogue.