Ap De-Authentication Attack Status; Figure 322: Ap De-Authentication Attack Status; Table 291: Ap De-Authentication Attack Status - D-Link DWL-8600AP User Manual

Dws-4000 series access points
Hide thumbs Also See for DWL-8600AP:
Table of Contents

Advertisement

D-Link UWS User Manual

AP De-Authentication Attack Status

The AP De-Authentication Attack Status page contains information about rogue APs that the Cluster
Controller has attacked by using the de-authentication attack feature.
The wireless switch can protect against rogue APs by sending de-authentication messages to the rogue AP. The
de-authentication attack feature must be globally enabled in order for the wireless system to do this function.
Make sure that no legitimate APs are classified as rogues before enabling the attack feature. This feature is
disabled by default.
The wireless system can conduct the de-authentication attack against 16 APs at the same time. The intent of
this attack is to serve as a temporary measure until the rogue AP is located and disabled.
The de-authentication attack is not effective for all rogue types, and therefore is not used on every detected
rogue. The following rogues are not subjected to the attack:
• If the detected rogue is spoofing the BSSID of the valid managed AP then the wireless system does not
attempt to use the attack because that attack may deny service to a legitimate AP and provide another
avenue for a hacker to attack the system.
• The de-authentication attack is not effective against Ad hoc networks because these networks do not use
authentication.
• The APs operating on channels outside of the country domain are not attacked because sending any
traffic on illegal channels is against the law.
The wireless switch maintains a list of BSSIDs against which it is conducting a de-authentication attack. The
switch sends the list of BSSIDs and channels on which the rogue APs are operating to every managed AP.
Click the MAC address of an AP in the list to access the detailed RF Scan information for the AP.
The following table describes the fields on the AP De-Authentication Attack Status page.
Field
BSSID
Channel
Time Since Attack Started
RF Scan Report Age
D-Link
Oct. 2015

Figure 322: AP De-Authentication Attack Status

Table 291: AP De-Authentication Attack Status

Description
Shows the BSSID of the AP against which the attack is launched. The BSSID is a
MAC address.
Identifies the channel on which the rogue AP is operating.
Shows the amount of time that has passed since the attack started on the AP.
Shows the amount of time that has passed since the RF Scan reported this AP.
Monitoring Status and Statistics
Unified Wired and Wireless Access System
Page 496

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents