Software User Manual
D-Link Unified Access System
12/10/09
Document
34CSFP6XXUWS-SWUM100-D7
Monitoring and Managing Intrusion Detection
Page 505
AP D
E
-A
UTHENTICATION
A
TTACK
S
TATUS
The
AP De-Authentication Attack Status
page contains information about rogue APs that the Cluster Controller has
attacked by using the de-authentication attack feature.
The wireless switch can protect against rogue APs by sending de-authentication messages to the rogue AP. The de-
authentication attack feature must be globally enabled in order for the wireless system to do this function. Make sure that no
legitimate APs are classified as rogues before enabling the attack feature. This feature is disabled by default.
The wireless system can conduct the de-authentication attack against 16 APs at the same time. The intent of this attack is
to serve as a temporary measure until the rogue AP is located and disabled.
The de-authentication attack is not effective for all rogue types, and therefore is not used on every detected rogue. The
following rogues are not subjected to the attack:
•
If the detected rogue is spoofing the BSSID of the valid managed AP then the wireless system does not attempt to use
the attack because that attack may deny service to a legitimate AP and provide another avenue for a hacker to attack
the system.
Table 327: Access Point Authentication Failure Details
Field
Description
MAC Address
The Ethernet address of the AP.
IP Address
The network IP address of the AP.
Last Failure Type
Indicates the last type of failure that occurred, which can be one of the following:
•
Local Authentication
•
No Database Entry
•
Not Managed
•
RADIUS Authentication
•
RADIUS Challenged
•
RADIUS Unreachable
•
Invalid RADIUS Response
•
Invalid Profile ID
•
Profile Mismatch-Hardware Type
Vendor ID
Vendor of the AP software.
Protocol Version
Indicates the protocol version supported by the software on the AP.
Software Version
Indicates the version of software on the AP.
Hardware Type
Hardware platform for the AP.
Reporting Switch
Shows whether the switch that reported the AP authentication failure is the local
switch or a peer switch.
Switch MAC Address
Shows the IP address of the switch in the cluster that reported the AP
authentication failure.
Switch IP Address
Shows the MAC address of the switch in the cluster that reported the AP
authentication failure.
Validation Failures
The count of association failures for this AP.
Authentication Failures
The count of authentication failures for this AP.
Age
Time since failure occurred.
Содержание DWS-4026
Страница 4: ...UWS Administrator s Guide ...
Страница 20: ...D Link Unified Access System Software User Manual 12 10 09 Page 20 34CSFP6XXUWS SWUM100 D7 ...
Страница 32: ...D Link Unified Access System Software User Manual 12 10 09 Page 32 Document 34CSFP6XXUWS SWUM100 D7 ...
Страница 278: ...D Link Unified Access System Software User Manual 12 10 09 Page 278 Managing LLDP Document 34CSFP6XXUWS SWUM100 D7 ...
Страница 576: ......