Software User Manual
D-Link Unified Access System
12/10/09
Document
34CSFP6XXUWS-SWUM100-D7
Visualizing the Wireless Network
Page 529
V
ISUALIZING
THE
W
IRELESS
N
ETWORK
The WLAN Visualization component is an optional feature that graphically shows information about the wireless network.
WLAN Visualization uses a Java applet to display switches, APs, and associated wireless clients. The WLAN Visualization
tool can help you visualize where the APs are in relationship to the building.
You can upload one or more custom images to create a background for the graph. Then, you place the WLAN components
discovered by the switch on the graph to help provide a realistic representation of your wireless network. From each object
on the WLAN Visualization graph, you can access information about the object and links to configuration pages on the Web
interface.
This section contains the following subsections to help you manage the WLAN Visualization component of the D-Link Unified
Switch:
•
Importing and Configuring a Background Image
•
Setting Up the Graph Components
Client Threat Mitigation
Select enable to send de-authentication messages to clients that are in the
Known Clients database but are associated with unknown APs. The
Authentication with Unknown AP Test must also be enabled in order for the
mitigation to take place.
Select disable to allow clients in the Known Clients database to remain
authenticated with an unknown AP.
Known Client Database Lookup
Method
When the switch detects a client on the network it performs a lookup in the
Known Client database.
Specify whether the switch should use the local or RADIUS database for
these lookups.
Known Client Database Radius Server
Name
If the known client database lookup method is RADIUS then this field specifies
the RADIUS server name.
Rogue Detected Trap Interval
Specify the interval, in seconds, between transmissions of the SNMP trap
telling the administrator that rogue APs are present in the RF Scan database.
If you set the value to 0, the trap is never sent.
De-Authentication Requests
Threshold Interval
Specify the number of seconds an AP should spend counting the de-
authentication messages sent by wireless clients.
De-Authentication Requests
Threshold Value
If switch receives more than specified messages during the threshold interval
the test triggers.
Authentication Requests Threshold
Interval
Specify the number of seconds an AP should spend counting the
authentication messages sent by wireless clients.
Authentication Requests Threshold
Value
If switch receives more than specified messages during the threshold interval
the test triggers.
Probe Requests Threshold Interval
Specify the number of seconds an AP should spend counting the probe
messages sent by wireless clients.
Probe Requests Threshold Value
Specify the number of probe requests a wireless client is allowed to send
during the threshold interval before the event is reported as a threat.
Authentication Failure Threshold
Value
Specify the number of 802.1X authentication failures a client is allowed to
have before the event is reported as a threat.
Table 341: WIDS Client Configuration
Field
Description