Detecting and Preventing Wireless Intrusion
D-Link
Unified Wired and Wireless Access System
Oct. 2015
Page 730
D-Link UWS User Manual
Click the
WIDS AP Rogue Classification
tab to learn which WIDS test triggered the rogue status.
Figure 446: WIDS Test Discovers Rogue
shows, the honeypot AP is identified as a rogue because it triggered the Managed SSID from an
unknown AP test. In other words, the honeypot AP, which is an unknown AP to the company, is using the same
SSID as the legitimate AP inside the building.
At this point, no further action is taken by the DWS-4000 Series switch because the AP deauthentication attack
feature is disabled. To enable the AP to take further action, enable the AP De-Authentication Attack option on
the
WLAN > Administration > Advanced Configuration > WIDS Security
tab.
Figure 447: De-Authentication Attack Enabled