EasyManuals Logo

D-Link DWL-2600AP User Manual

D-Link DWL-2600AP
754 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #633 background imageLoading...
Page #633 background image
Configuring Advanced Settings
D-Link Unified Wired and Wireless Access System
Oct. 2015 Page 633
D-Link UWS User Manual
Command Buttons
The page includes the following buttons:
Submit—Updates the switch with the values you enter. To retain the new values across a power cycle,
you must perform a save (Tool > Save Changes).
Refresh—Updates the page with the latest information.
Standalone AP with
unexpected configuration
If the AP is classified as a known standalone AP, then the switch checks
whether the AP is operating with the expected configuration parameters.
You configure the expected parameters for the standalone AP in the local or
RADIUS Valid AP database.
This test may detect network misconfiguration as well as potential intrusion
attempts.The following parameters are checked:
Channel Number
SSID
Security Mode
WDS Mode
Presence on a wired network
Unexpected WDS device
detected on network
If the AP is classified as a Managed or Unknown AP and wireless distribution
system (WDS) traffic is detected on the AP, then the AP is considered to be
Rogue.
Only stand-alone APs that are explicitly allowed to operate in WDS mode are
not reported as rogues by this test.
Unmanaged AP detected on
wired network
This test checks whether the AP is detected on the wired network. If the AP
state is Unknown, then the test changes the AP state to Rogue. The flag
indicating whether AP is detected on the wired network is reported as part of
the RF Scan report. If AP is managed and is detected on the network then the
switch simply reports this fact and doesn't change the AP state to Rogue.
In order for the wireless system to detect this threat, the wireless network
must contain one or more radios that operate in sentry mode.
Rogue Detected Trap Interval Specify the interval, in seconds, between transmissions of the SNMP trap
telling the administrator that rogue APs are present in the RF Scan database.
If you set the value to 0, the trap is never sent.
Wired Network Detection
Interval
Specify the number of seconds that the AP waits before starting a new wired
network detection cycle. If you set the value to 0, wired network detection is
disabled.
AP De-Authentication Attack Enable or disable the AP de-authentication attack.
The wireless switch can protect against rogue APs by sending de-
authentication messages to the rogue AP. The de-authentication attack
feature must be globally enabled in order for the wireless system to do this
function. Make sure that no legitimate APs are classified as rogues before
enabling the attack feature. This feature is disabled by default.
Table 362: WIDS AP Configuration (Cont.)
Field Description

Table of Contents

Other manuals for D-Link DWL-2600AP

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the D-Link DWL-2600AP and is the answer not in the manual?

D-Link DWL-2600AP Specifications

General IconGeneral
Networking standardsIEEE 802.3af
Ethernet LAN data rates10, 100 Mbit/s
Maximum data transfer rate300 Mbit/s
InternalYes
LED indicatorsPower, Stand-by, Status, WAN, WLAN
WAN connectionEthernet (RJ-45)
Ethernet LAN (RJ-45) ports1
Security algorithmsWEP, WPA, WPA2
Operating temperature (T-T)0 - 40 °C
Operating relative humidity (H-H)10 - 90 %
Weight and Dimensions IconWeight and Dimensions
Width160 mm
Height45 mm
Weight240 g
Dimensions (WxDxH)160 x 160 x 45 mm

Related product manuals