EasyManuals Logo

D-Link DWC-1000 User Manual

D-Link DWC-1000
390 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #66 background imageLoading...
Page #66 background image
D-Link DWC-1000 User Manual 66
Section 4 - Advanced WLAN Conguration
2. Enable or disable the security options as desired (refer to the table below) and click Save.
Field Description
Administrator Congured
Rogue AP
If the source MAC address is in the valid‐AP database on the controller or on the RADIUS
server, and the AP type is marked as Rogue, then the AP state is Rogue.
Managed SSID from an
Unknown AP
This test checks whether an unknown AP is using the managed network SSID. A hacker
may set up an AP with managed SSID to fool users into associating with the AP and
revealing password and other secure information.
Administrators with large networks who are using multiple clusters should either use
dierent network names in each cluster or disable this test. Otherwise, if an AP in the
rst cluster detects APs in the second cluster transmitting the same SSID as APs in the
rst cluster then these APs are reported as rogues.
Managed SSID from a Fake
Managed AP
A hacker may set up an AP with the same MAC address as one of the managed APs and
congure it to send one of the managed SSIDs. This test checks for a vendor eld in the
beacons which is always transmitted by managed APs. If the vendor eld is not present,
then the AP is identied as a fake AP.
AP without a SSID
SSID is an optional eld in beacon frames. To avoid detection a hacker may set up an AP
with the managed network SSID, but disable SSID transmission in the beacon frames.
The AP would still send probe responses to clients that send probe requests for the
managed SSID fooling the clients into associating with the hackers AP.
This test detects and ags APs that transmit beacons without the SSID eld. The test
is automatically disabled if any of the radios in the proles are congured not to send
SSID eld, which is not recommended because it does not provide any real security and
disables this test.
Fake Managed AP on an
Invalid Channel
This test detects rogue APs that transmit beacons from the source MAC address of one
of the managed APs, but on dierent channel from which the AP is supposed to be
operating.
Managed SSID Detected with
Incorrect Security
During RF Scan, the AP examines beacon frames received from other APs and
determines whether the detected AP is advertising an open network, WEP, or WPA.
If the SSID reported in the RF Scan is one of the managed networks and its congured
security does not match the detected security, then this test marks the AP as rogue.
Invalid SSID from a Managed
AP
This test checks whether a known managed AP is sending an unexpected SSID. The
SSID reported in the RF Scan is compared to the list of all congured SSIDs that are
used by the prole assigned to the managed AP. If the detected SSID doesnt match any
congured SSID, then the AP is marked as rogue.
AP is Operating on an Illegal
Channel
The purpose of this test is to detect hackers or incorrectly congured devices that are
operating on channels that are not legal in the country where the wireless system is set up.
Note: In order for the wireless system to detect this threat, the wireless network must contain
one or more radios that operate in sentry mode.
Standalone AP with
Unexpected Conguration
If the AP is classied as a known standalone AP, then the controller checks whether
the AP is operating with the expected conguration parameters. You congure the
expected parameters for the standalone AP in the local or RADIUS Valid AP database.
This test may detect network wrong conguration as well as potential intrusion
attempts. The following parameters are checked:
Channel Number
• SSID
Security Mode
WDS Mode
Presence on a wired network

Table of Contents

Other manuals for D-Link DWC-1000

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the D-Link DWC-1000 and is the answer not in the manual?

D-Link DWC-1000 Specifications

General IconGeneral
Ethernet LANYes
Wi-Fi standards802.11a, 802.11b, 802.11g
Networking standardsIEEE 802.1Q, IEEE 802.1x, IEEE 802.3, IEEE 802.3ad, IEEE 802.3u
Ethernet LAN data rates10, 100, 1000 Mbit/s
Number of managed Wi-Fi Access Points (max)6
Security algorithms3DES, DES, WEP, WPA, WPA2
USB 2.0 ports quantity2
Ethernet LAN (RJ-45) ports4
USB 3.2 Gen 1 (3.1 Gen 1) Type-A ports quantity0
CertificationFCC B, CE B, VCCI, C-tick, IC, cUL, LVD (EN60950-1)
Built-in displayNo
Operating temperature (T-T)0 - 40 °C
Operating relative humidity (H-H)5 - 95 %
Power requirementsDC 12V/2.5A
Power consumption (typical)19.3 W
Pallet width1200 mm
Pallet length1100 mm
Pallet height (air)1419 mm
Pallet height (sea)1847 mm
Pallet gross weight (air)415236 g
Pallet gross weight (sea)545648 g
Quantity per pallet (air)144 pc(s)
Quantity per pallet (sea)192 pc(s)
Shipping (inner) case width296 mm
Shipping (inner) case height428 mm
Shipping (inner) case length354 mm
Shipping (inner) case weight10826 g
Shipping (inner) case net weight10016 g
Number of cartons per pallet (air)36 pc(s)
Number of cartons per pallet (sea)48 pc(s)
Quantity per shipping (inner) case4 pc(s)
Weight and Dimensions IconWeight and Dimensions
Package depth396 mm
Package width273 mm
Package height80 mm
Package weight2504 g
Dimensions (WxDxH)280 x 180 x 44 mm

Related product manuals