D-Link DWS-1008 User Manual
xvi
Summary of Rogue Detection Features ...................................................................................380
Configuring Rogue Detection Lists ...........................................................................................381
Configuring a Permitted Vendor List ..................................................................................381
Configuring a Permitted SSID List .....................................................................................382
Configuring a Client Black List ...........................................................................................383
Configuring an Attack List ..................................................................................................384
Configuring an Ignore List ..................................................................................................385
Enabling Countermeasures ......................................................................................................386
Disabling or Reenabling Active Scan ........................................................................................387
Enabling AP Signatures ............................................................................................................387
Disabling or Reenabling Logging of Rogues ............................................................................387
Enabling Rogue and Countermeasures Notifications ...............................................................388
IDS and DoS Alerts ..................................................................................................................388
Flood Attacks .....................................................................................................................388
DoS Attacks .......................................................................................................................388
Netstumbler and Wellenreiter Applications ........................................................................389
Wireless Bridge ..................................................................................................................389
Ad-Hoc Network .................................................................................................................390
Weak WEP Key Used by Client .........................................................................................390
Disallowed Devices or SSIDs ............................................................................................390
Displaying Statistics Counters ...........................................................................................390
IDS Log Message Examples ............................................................................................390
Displaying Rogue Clients ...................................................................................................393
Displaying Rogue Detection Counters ...............................................................................394
Displaying RF Detect Data.................................................................................................395
Displaying the APs Detected by an AP Radio ..................................................................395
Displaying Countermeasures Information ..........................................................................396
Displaying Software Version Information ...........................................................................397
Displaying Boot Information ...............................................................................................398
Displaying a List of Files ....................................................................................................399
Copying a File ....................................................................................................................402
Using an Image File’s MD5 Checksum To Verify Its Integrity .............................................404
Deleting a File ....................................................................................................................405
Creating a Subdirectory .....................................................................................................405
Removing a Subdirectory ..................................................................................................406
Displaying the Running Configuration ................................................................................406
Saving Configuration Changes ..........................................................................................408
Specifying the Configuration File to Use After the Next Reboot ........................................408
Loading a Configuration File ..............................................................................................409
Specifying a Backup Configuration File .............................................................................409
Resetting to the Factory Default Configuration ..................................................................410
Summary of Contents for DWS-1008
Page 1: ......