Linksys WUSB200 manual Legitimate AP

Page 63

Wireless-G Business USB Network Adapter with RangeBooster

 

 

Table 1: Alerts

 

 

 

 

Item

Alert

Description

Advice

 

 

 

 

 

 

 

Description:

 

 

 

Client not associated with AP is sending traffic. Probable rogue client. The Client

 

 

 

might be trying to make the network busy and causing heavy loading to the AP.

 

Client is Sending Spurious

Client not associated with AP is sending

 

5

traffic. For details, press the Advice

 

Traffic

 

 

button.

Action:

 

 

 

 

 

1. Contact network administrator.

 

 

 

2. Add the Client MAC address to MAC Access Control List on AP Web Page.

 

 

 

 

 

 

 

Description:

 

 

 

A wireless client using Adhoc structure has the same SSID as the AP's SSID.

 

 

 

Illegitimate AP could use the same SSID to fool other wireless clients that it is a

 

Adhoc SSID is the same as

A wireless client using Adhoc structure

legitimate AP.

6

has the same SSID as the AP's SSID. For

 

the AP's

 

 

details, press the Advice button.

Action:

 

 

 

 

 

1. Contact network administrator.

 

 

 

2. Try to physically locate the wireless client computers.

 

 

 

 

 

 

 

Description:

 

 

 

Packets with abnormally large duration sent by a client may prevent other clients

 

 

 

from sending packets to the AP.

 

 

Abnormally large duration for packets

Client computer information:

 

 

 

7

Duration Attack

sent by client. For details, press the

 

 

 

Advice button.

Action:

 

 

 

 

 

 

1. Try to physically locate the wireless client computer.

 

 

 

2. Add the Client's MAC address to MAC Access Control List on the AP.

 

 

 

 

Chapter 6: The Administrative Functions in the Wireless Network Monitor

56

Security Monitor

Image 63
Contents Wireless-G Business USB Network Adapter with RangeBooster Copyright and Trademarks How to Use this User GuideTable of Contents Windows XP Wireless Zero Configuration Appendix C Wireless SecurityLEDs List of FiguresCreating a Profile WEP Key Needed 43 Editing a Profile Congratulations Welcome IntroductionWhat’s in this User Guide? Wireless-G Business USB Network Adapter with RangeBooster Planning your Wireless Network Network TopologyRoaming Network Layout LED Indicators Getting to Know the Wireless-G Business USB Network AdapterSetup Wizard’s Welcome Screen Starting the SetupSetup Wizard’s License Agreement Connecting the AdapterAvailable Wireless Network Setting up the AdapterWEP WPA2-Personal WPA-Personal10 Creating a Profile Manual Setup12 Ad-Hoc Mode Settings 14 Wireless Security WPA Personal TLS EAP-TLS WPA EnterpriseWPA2 Enterprise 20 Wireless Security Radius EAP-TLSRadius Link Information Using the Wireless Network MonitorAccessing the Wireless Network Monitor Using the Wireless Network MonitorsStatus Link Information Wireless Network StatusStatistics Link Information Wireless Network StatisticsProfile Information ProfilesCreate a New Profile Creating a Profile Available Wireless Network10 Creating a Profile WPA-Personal 12 Creating a Profile Manual Setup Network Settings 15 Creating a Profile Manual Setup Wireless Security WEP Using the Wireless Network Monitor Create a New Profile WPA Enterprise WPA2 Enterprise Radius 24 Creating a Profile Manual Setup Wireless Security Leap Editing a Profile 26 Creating a Profile Manual Setup Congratulations29 Editing a Profile Ad Hoc Mode WEP 32 Editing a Profile Wireless Security WPA Personal 35 Editing a Profile Wireless Security WPA Enterprise Peap 37 Editing a Profile Wireless Security WPA2 Enterprise Peap Radius EAP-TLS Leap 43 Editing a Profile Congratulations Site Information Site SurveyAdministration TroubleshootingLog in as the Access Points administrator Access Point Account49 Administration Security Monitor Account Classification Administrative Functions in the Wireless Network MonitorAP Classification ClassificationTrusted MAC Addresses Advanced SettingsAllowed Vendor List Configuration Allowed Channel Configuration Security MonitorChannel Usage Client Inventory AP InventoryAlerts Summary AlertAlert Details Alert List 18 Security Monitor Alert Advice AdviceDisassociation attacking Alert Description Advice Legitimate AP Attacks or sniffing AP does not have any encryption Updated Client computers Ssid and MAC address 19 Security Monitor Windows Firewall Screen Windows FirewallCommon Problems and Solutions Appendix a TroubleshootingCan users turn off the pop-up alerts? Frequently Asked QuestionsWhat is the 802.11b standard? What is ISM band? What is WEP? Windows XP Wireless Zero Configuration Appendix B Windows XP Wireless Zero ConfigurationFigure B-4 Available Wireless Network Figure B-6 Network Connection Wireless Security Appendix C Wireless Security Security PrecautionsSecurity Threats Facing Wireless Networks Appendix C Wireless Security Wireless-G Business USB Network Adapter with RangeBooster Appendix D Windows Help Shared ResourcesNetwork Neighborhood/My Network Places Appendix E Glossary Wireless-G Business USB Network Adapter with RangeBooster Wireless-G Business USB Network Adapter with RangeBooster Wireless-G Business USB Network Adapter with RangeBooster Wireless-G Business USB Network Adapter with RangeBooster Appendix F Specifications Operating Humidity Unit Weight 15 oz 0.061 kg CertificationsOperating Temp Storage TempLimited Warranty Appendix G Warranty InformationFCC Statement Appendix H Regulatory InformationWireless-N Notebook Adapter Dual-Band Wireless-N Notebook Adapter Dual-Band Wireless-N Notebook Adapter Dual-Band Wireless-N Notebook Adapter Dual-Band Wireless-N Notebook Adapter Wireless-N Notebook Adapter Appendix I Contact Information