beautypg.com

De-auth attack status – Allied Telesis AT-UWC Series User Manual

Page 301

background image

Chapter 5: Wireless LAN

301

De-Auth Attack Status

From the AP De-Auth Attack Status page, you can view a list of access
points that the WLAN Controller is targeting for the de-authentication
attack.

When the de-authentication attack is enabled, the WLAN Controller calls
the managed access points to send IEEE802.11 de-authentication
management frames to rogue access points in order to disconnect them
from the wireless network. To enable the de-authentication attack, see
“WIDS AP Configuration” on page 351.

To view access points that WLAN Controller is targeting for the de-
authentication attack, do the following:

1. From the Navigation pane, go to WLAN > Intrusion Detection >

AP De-Auth Attack Status.

The WIDS AP De-Authentication Attack Status page is displayed.

2. Observe the fields described in Table 127.

3. If you want to refresh the display, click Refresh.

Table 127. WIDS AP De-Authentication Attack Status

Field

Description

BSSID

Displays the MAC address of the access point
targeted for the de-authentication attack.

Channel

Displays the channel that the access point
communicates through.

Time Since Attack
Started

Displays the time period since the de-
authentication attack started.

RF Scan Report Age

Displays the time period since the access point
was detected by the RF scan.