EasyManuals Logo

D-Link DWL-2600AP User Manual

D-Link DWL-2600AP
754 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #730 background imageLoading...
Page #730 background image
Detecting and Preventing Wireless Intrusion
D-Link Unified Wired and Wireless Access System
Oct. 2015 Page 730
D-Link UWS User Manual
Click the WIDS AP Rogue Classification tab to learn which WIDS test triggered the rogue status.
Figure 446: WIDS Test Discovers Rogue
As Figure 446 shows, the honeypot AP is identified as a rogue because it triggered the Managed SSID from an
unknown AP test. In other words, the honeypot AP, which is an unknown AP to the company, is using the same
SSID as the legitimate AP inside the building.
At this point, no further action is taken by the DWS-4000 Series switch because the AP deauthentication attack
feature is disabled. To enable the AP to take further action, enable the AP De-Authentication Attack option on
the WLAN > Administration > Advanced Configuration > WIDS Security tab.
Figure 447: De-Authentication Attack Enabled

Table of Contents

Other manuals for D-Link DWL-2600AP

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the D-Link DWL-2600AP and is the answer not in the manual?

D-Link DWL-2600AP Specifications

General IconGeneral
Networking standardsIEEE 802.3af
Ethernet LAN data rates10, 100 Mbit/s
Maximum data transfer rate300 Mbit/s
InternalYes
LED indicatorsPower, Stand-by, Status, WAN, WLAN
WAN connectionEthernet (RJ-45)
Ethernet LAN (RJ-45) ports1
Security algorithmsWEP, WPA, WPA2
Operating temperature (T-T)0 - 40 °C
Operating relative humidity (H-H)10 - 90 %
Weight and Dimensions IconWeight and Dimensions
Width160 mm
Height45 mm
Weight240 g
Dimensions (WxDxH)160 x 160 x 45 mm

Related product manuals