Allied Telesis AT-UWC Series User Manual
Page 353

Chapter 5: Wireless LAN
353
3. Click the following buttons as needed:
Refresh — Refreshes the display on this page.
Submit — Makes the changes effective and saves them to the
running configuration file.
Note
To save your changes to the startup configuration file, see “Save All
Applied Changes” on page 39.
Standalone AP
with unexpected
configuration
Enables or disables detecting an access point with
the standalone mode that is not operating as its
settings. The standalone access point is tested in
the channel, SSID, security method, WDS mode,
and wired connection.
Unexpected
WDS device
detected on
network
Enables or disables detecting a managed or
unknown AP that is operating in the WDS mode
and marking the access point as rogue.
Unmanaged AP
detected on
wired network
Enables or disables detecting an unknown AP that
is connected to the wired network and marking the
access point as rogue.
To enable this detection, you must have the
designated access point with the sentry mode.
Rogue Detected
Trap Interval
(seconds)
Specifies the time interval that SNMP traps with
Rogue AP information are sent. When 0 is set, no
SNMP traps are sent.
Wired Network
Detection
Interval
(seconds)
Specifies the time interval that probe frames are
sent to the wired network. When 0 is set, no probe
frames are sent.
AP De-
Authentication
Attack
Enables or disables AP De-Authentication Attack.
AP De-Authentication Attack is a feature to
disconnect rogue access points by sending IEEE
802.11 de-authentication frames to the rogue
access points.
Table 145. WIDS AP Configuration (Continued)
Field
Description