Linksys WAP200RF manual Security Monitor Event Log Tab, Mail Notification

Page 38

Wireless-G Access Point with Power Over Ethernet and Rangebooster

The Security Monitor - Event Log Tab

Configure the event logging options for security monitor.

E-mail Notification

Recipient To. Enter the e-mail address that the alarm notifications should be sent to. Alarm Type. Select the type of intrusions that should require an e-mail notification.

Rogue AP Detected. Indicates a rogue access point has been detected.

AP SSID Changed. Indicates the Access Point’s SSID has been changed.

Spoofed MAC Address. Indicates another device is using the AP’s MAC address to send out packets.

Client is Sending Spurious Traffic. Indicates an unassociated client is sending out frames to the AP.

Adhoc SSID same as AP. Indicates an Adhoc network uses the same SSID as the AP.

Adhoc Network Operating. Indicates when a STA is advertising a peer-to-peer (Adhoc) network.

Rogue Client Detected. Indicates when a STA is conducting an illegal transaction with an AP.

Default SSID in use. Indicates when the default SSID is in use on an AP.

Association Table Full. Indicates an AP refused a new STA association due to resource unavailability.

Low Speed Connection. Indicates when a STA is transmitting data at a much slower rate set by AP.

New Client Detected. Indicates a new STA is associated with an AP.

New Access Point Detected. Indicates a new AP has been detected joining the network.

Duration Attack. Indicates a STA packet contains an abnormally large duration value in the 802.11 header.

AP is Not Using Encryption. Indicates when an AP has wireless security disabled.

AP Channel Changed. Indicates when an AP changes its wireless channel.

AP Broadcasting SSID. Indicates when SSID broadcasting is enabled on an AP.

Chapter 6: Configuring the Wireless-G Access Point

Figure 6-21: Security Monitor - Event Log

32

The Security Monitor - Event Log Tab

Image 38
Contents User Guide How to Use this User Guide Copyright and TrademarksTable of Contents Frequently Asked Questions Appendix a TroubleshootingAppendix B Wireless Security Example of a Simple Wireless Network List of Figures20 Security Monitor Basic Settings Introduction WelcomeWhat’s in this User Guide? Introduction What’s in this User Guide? Roaming Planning Your Wireless NetworkNetwork Topology Network Layout Example of a simple wireless network Getting to Know the Wireless-G Access Point LEDsAccess Point’s port are located on the back of the device PortsDesktop Placement and Antenna Setup Antennas and PositionsConnection Connecting the Wireless-G Access PointOverview Wall-Mount Option Placement OptionsStand Option Setting Up the Wireless-G Access Point Accessing the UtilityNavigating the Utility SetupWireless Security Monitor AP ModeAdministration Status Basic Setup Configuring the Wireless-G Access PointSetup Basic Setup Tab Network SetupSetup Time Tab TimeWireless Basic Wireless Settings Tab Basic SettingsWireless Wireless Security Tab Wireless SecurityWPA-Personal aka WPA-PSK WPA2-PersonalWPA2-Personal Mixed WPA-EnterpriseWPA2-Enterprise WPA2-Enterprise MixedDisable RadiusWireless Client List Wireless Wireless Connection Control TabWireless Connection Control Connection ControlWireless Advanced Wireless Settings Tab Advanced SettingsWireless Vlan & QoS Tab VlanQoS AP Mode Tab MAC Address18 Wireless Repeater Mode 19 Wireless Bridge Mode Security Monitor Accounts Security Monitor Basic Settings TabWireless Security Monitor Security Monitor Event Log Tab Mail NotificationSyslog Notification Local AP Password Administration Management TabWeb Access ManagementSnmp IdentificationEmail Alert Administration Log TabLog Notification Queue LengthFactory Default Administration Factory Default TabAdministration Firmware Upgrade Tab Firmware UpgradeReboot Administration Reboot TabAdministration Config Management Tab Config ManagementLocal Network Status Local Network TabInformation Status Wireless Tab Wireless NetworkStatus System Performance Tab WiredWireless System PerformancePage Appendix a Troubleshooting Frequently Asked QuestionsWhat Ieee 802.11g features are supported? What is the ISM band? Does the Access Point function as a firewall? Security Threats Facing Wireless Networks Appendix B Wireless SecuritySecurity Precautions Appendix B Wireless Security Page Appendix C Upgrading Firmware Network Neighborhood/My Network Places Appendix D Windows HelpShared Resources Appendix E Glossary Appendix E Glossary Appendix E Glossary Appendix E Glossary Appendix E Glossary Appendix F Specifications 802.11F Wireless Roaming11.g 54Mbps@ -72dBm, 11.b 11Mbps@ -85dBM Dhcp Client11g 14 dBm SecurityCertification Wireless Security MonitorSuspicious network events Appendix G Warranty Information Limited WarrantyAppendix H Regulatory Information Appendix H Regulatory Information Appendix H Regulatory Information Appendix H Regulatory Information Appendix H Regulatory Information Appendix H Regulatory Information Appendix H Regulatory Information Information section in this Guide Appendix I Contact InformationNeed to contact Linksys?