Linksys WAP200RF manual Syslog Notification

Page 39

Wireless-G Access Point with Power Over Ethernet and Rangebooster

• Duplicate SSID in use. Indicates an unauthorized AP has the same SSID value as an authorized AP.

SYSLOG Notification

Logviewer IP Address. Enter the IP address of the system that will store the system log.

Alarm Type. Select the type of intrusions that should require an e-mail notification.

Rogue AP Detected. Indicates a rogue access point has been detected.

AP SSID Changed. Indicates the Access Point’s SSID has been changed.

Spoofed MAC Address. Indicates another device is using the AP’s MAC address to send out packets.

Client is Sending Spurious Traffic. Indicates an unassociated client is sending out frames to the AP.

Adhoc SSID same as AP. Indicates an Adhoc network uses the same SSID as the AP.

Adhoc Network Operating. Indicates when a STA is advertising a peer-to-peer (Adhoc) network.

Rogue Client Detected. Indicates when a STA is conducting an illegal transaction with an AP.

Default SSID in use. Indicates when the default SSID is in use on an AP.

Association Table Full. Indicates an AP refused a new STA association due to resource unavailability.

Low Speed Connection. Indicates when a STA is transmitting data at a much slower rate set by AP.

New Client Detected. Indicates a new STA is associated with an AP.

New Access Point Detected. Indicates a new AP has been detected joining the network.

Duration Attack. Indicates a STA packet contains an abnormally large duration value in the 802.11 header.

AP is Not Using Encryption. Indicates when an AP has wireless security disabled.

AP Channel Changed. Indicates when an AP changes its wireless channel.

AP Broadcasting SSID. Indicates when SSID broadcasting is enabled on an AP.

Duplicate SSID in use. Indicates an unauthorized AP has the same SSID value as an authorized AP.

Chapter 6: Configuring the Wireless-G Access Point

33

The Security Monitor - Event Log Tab

Image 39
Contents User Guide Copyright and Trademarks How to Use this User GuideTable of Contents Appendix a Troubleshooting Appendix B Wireless SecurityFrequently Asked Questions List of Figures Example of a Simple Wireless Network20 Security Monitor Basic Settings Welcome IntroductionWhat’s in this User Guide? Introduction What’s in this User Guide? Planning Your Wireless Network Network TopologyRoaming Network Layout Example of a simple wireless network LEDs Getting to Know the Wireless-G Access PointPorts Access Point’s port are located on the back of the deviceAntennas and Positions Desktop Placement and Antenna SetupConnecting the Wireless-G Access Point OverviewConnection Placement Options Stand OptionWall-Mount Option Accessing the Utility Setting Up the Wireless-G Access PointSetup WirelessNavigating the Utility AP Mode AdministrationSecurity Monitor Status Network Setup Configuring the Wireless-G Access PointSetup Basic Setup Tab Basic SetupTime Setup Time TabBasic Settings Wireless Basic Wireless Settings TabWireless Security Wireless Wireless Security TabWPA2-Personal WPA-Personal aka WPA-PSKWPA-Enterprise WPA2-Personal MixedWPA2-Enterprise Mixed WPA2-EnterpriseRadius DisableConnection Control Wireless Wireless Connection Control TabWireless Connection Control Wireless Client ListAdvanced Settings Wireless Advanced Wireless Settings TabVlan Wireless Vlan & QoS TabQoS MAC Address AP Mode Tab18 Wireless Repeater Mode 19 Wireless Bridge Mode Security Monitor Basic Settings Tab Wireless Security MonitorSecurity Monitor Accounts Mail Notification Security Monitor Event Log TabSyslog Notification Management Administration Management TabWeb Access Local AP PasswordIdentification SnmpNotification Queue Length Administration Log TabLog Email AlertFirmware Upgrade Administration Factory Default TabAdministration Firmware Upgrade Tab Factory DefaultConfig Management Administration Reboot TabAdministration Config Management Tab RebootStatus Local Network Tab InformationLocal Network Wireless Network Status Wireless TabSystem Performance WiredWireless Status System Performance TabPage Frequently Asked Questions Appendix a TroubleshootingWhat Ieee 802.11g features are supported? What is the ISM band? Does the Access Point function as a firewall? Appendix B Wireless Security Security PrecautionsSecurity Threats Facing Wireless Networks Appendix B Wireless Security Page Appendix C Upgrading Firmware Appendix D Windows Help Shared ResourcesNetwork Neighborhood/My Network Places Appendix E Glossary Appendix E Glossary Appendix E Glossary Appendix E Glossary Appendix E Glossary 802.11F Wireless Roaming Appendix F SpecificationsSecurity Dhcp Client11g 14 dBm 11.g 54Mbps@ -72dBm, 11.b 11Mbps@ -85dBMWireless Security Monitor Suspicious network eventsCertification Limited Warranty Appendix G Warranty InformationAppendix H Regulatory Information Appendix H Regulatory Information Appendix H Regulatory Information Appendix H Regulatory Information Appendix H Regulatory Information Appendix H Regulatory Information Appendix H Regulatory Information Appendix I Contact Information Need to contact Linksys?Information section in this Guide