Wireless-G Business USB Network Adapter with RangeBooster
Alert
Overview
Both the WAP200 Access Point and client USB Network Adapter monitor the state of your wireless network and report on security related issues, ranging from
The Access Point does most of the security monitoring work while the client Notebook Adapter can detect new and rogue access points. The management software runs on the client PC, which allows the system administrator to perform initial setup of security profiles and classification of the wireless network devices.
When a client Notebook Adapter detects an unknown access point, it will notify its associated Access Point. The Access Points synchronize security alerts with each other and send the alert to the administrator.
Once the administrator is alerted with the security alarm, the administrator or one of the five authorized users can log in to the Security Monitor to retrieve the Alert Log from the Access Point.
There are four categories of policy violation rules listed under Alert Type: Intrusion Alarms: unauthorized
connection or hacking attack taking place on the network, Denial of Service Alarms: denial of service attack
detected on the network, Vulnerability Alarms: potential threat to the security of the network, and Others. Each represents a different kind of threat to the wireless network, ranging from poor performance to unauthorized users connected to the network. A violation will be listed under Amount. You can click Retrieve Alert log to view the Alert List. When Detail is clicked, the Details screen appears with more detailed information of the event, then you can click Advice to view the suggested advice for the event.
Alerts Summary
The Alerts Summary screen lists the alert types, amount of alerts, and available details.
Detail - Click the Detail button to view more detailed information for each event.
Receive Alert logs - Select this to receive alert logs from access points.
Retrieve Alert log - Click this button to view an alert log.
Enable
Click Back to go to the previous screen.
Chapter 6: The Administrative Functions in the Wireless Network Monitor
Figure 6-14: Security Monitor - Alerts Summary
Figure 6-15: Security Monitor - POP-UP Alert
51
Security Monitor