D-Link Unified Access System
Software User Manual
12/10/09
Page 506
Configuring Advanced Settings
Document
34CSFP6XXUWS-SWUM100-D7
•
The de-authentication attack is not effective against Ad hoc networks because these networks do not use
authentication.
•
The APs operating on channels outside of the country domain are not attacked because sending any traffic on illegal
channels is against the law.
The wireless switch maintains a list of BSSIDs against which it is conducting a de-authentication attack. The switch sends
the list of BSSIDs and channels on which the rogue APs are operating to every managed AP.
Click the MAC address of an AP in the list to access the detailed RF Scan information for the AP.
Figure 351: AP De-Authentication Attack Status
describes the fields on the
AP De-Authentication Attack Status
page.
C
ONFIGURING
A
DVANCED
S
ETTINGS
The Advanced Configuration folder contains links to the following pages:
•
•
•
•
•
A
DVANCED
G
LOBAL
S
ETTINGS
The fields on the advanced
Wireless Global Configuration
page are settings that apply to the Unified Switch.
Table 328: AP De-Authentication Attack Status
Field
Description
BSSID
Shows the BSSID of the AP against which the attack is launched. The BSSID
is a MAC address.
Channel
Identifies the channel on which the rogue AP is operating.
Time Since Attack Started
Shows the amount of time that has passed since the attack started on the AP.
RF Scan Report Age
Shows the amount of time that has passed since the RF Scan reported this
AP.