De-auth attack status – Allied Telesis AT-UWC Series User Manual
Page 301

Chapter 5: Wireless LAN
301
De-Auth Attack Status
From the AP De-Auth Attack Status page, you can view a list of access
points that the WLAN Controller is targeting for the de-authentication
attack.
When the de-authentication attack is enabled, the WLAN Controller calls
the managed access points to send IEEE802.11 de-authentication
management frames to rogue access points in order to disconnect them
from the wireless network. To enable the de-authentication attack, see
“WIDS AP Configuration” on page 351.
To view access points that WLAN Controller is targeting for the de-
authentication attack, do the following:
1. From the Navigation pane, go to WLAN > Intrusion Detection >
AP De-Auth Attack Status.
The WIDS AP De-Authentication Attack Status page is displayed.
2. Observe the fields described in Table 127.
3. If you want to refresh the display, click Refresh.
Table 127. WIDS AP De-Authentication Attack Status
Field
Description
BSSID
Displays the MAC address of the access point
targeted for the de-authentication attack.
Channel
Displays the channel that the access point
communicates through.
Time Since Attack
Started
Displays the time period since the de-
authentication attack started.
RF Scan Report Age
Displays the time period since the access point
was detected by the RF scan.