![background image](http://html1.mh-extra.com/html/linksys/wusb200/wusb200_user-manual_1924076058.webp)
51
Chapter 6: The Administrative Functions in the Wireless Network Monitor
Security Monitor
Wireless-G Business USB Network Adapter with RangeBooster
Alert
Overview
Both the WAP200 Access Point and client USB Network Adapter monitor the state of your wireless network and
report on security related issues, ranging from on-going attacks down to vulnerabilities in the network
configuration.
The Access Point does most of the security monitoring work while the client Notebook Adapter can detect new
and rogue access points. The management software runs on the client PC, which allows the system
administrator to perform initial setup of security profiles and classification of the wireless network devices.
When a client Notebook Adapter detects an unknown access point, it will notify its associated Access Point. The
Access Points synchronize security alerts with each other and send the alert to the administrator.
Once the administrator is alerted with the security alarm, the administrator or one of the five authorized users
can log in to the Security Monitor to retrieve the Alert Log from the Access Point.
There are four categories of policy violation rules listed under
Alert Type
: Intrusion Alarms: unauthorized
connection or hacking attack taking place on the network, Denial of Service Alarms: denial of service attack
detected on the network, Vulnerability Alarms: potential threat to the security of the network, and Others. Each
represents a different kind of threat to the wireless network, ranging from poor performance to unauthorized
users connected to the network. A violation will be listed under
Amount
. You can click Retrieve Alert log to view
the
Alert List
. When
Detail
is clicked, the
Details
screen appears with more detailed information of the event, then
you can click
Advice
to view the suggested advice for the event.
Alerts Summary
The
Alerts Summary
screen lists the alert types, amount of alerts, and available details.
Detail
- Click the
Detail
button to view more detailed information for each event.
Receive Alert logs
- Select this to receive alert logs from access points.
Retrieve Alert log
- Click this button to view an alert log.
Enable Pop-up
- Select this to allow this client to receive a pop-up warning message when a new access point
or client is detected.
Click
Back
to go to the previous screen.
Figure 6-14: Security Monitor - Alerts Summary
Figure 6-15: Security Monitor - POP-UP Alert