Wireless-G Business USB Network Adapter with RangeBooster
|
| Table 1: Alerts | |
|
|
|
|
Item | Alert | Description | Advice |
|
|
|
|
|
|
| Description: |
|
|
| Client not associated with AP is sending traffic. Probable rogue client. The Client |
|
|
| might be trying to make the network busy and causing heavy loading to the AP. |
| Client is Sending Spurious | Client not associated with AP is sending |
|
5 | traffic. For details, press the Advice |
| |
Traffic |
| ||
| button. | Action: | |
|
| ||
|
|
| 1. Contact network administrator. |
|
|
| 2. Add the Client MAC address to MAC Access Control List on AP Web Page. |
|
|
|
|
|
|
| Description: |
|
|
| A wireless client using Adhoc structure has the same SSID as the AP's SSID. |
|
|
| Illegitimate AP could use the same SSID to fool other wireless clients that it is a |
| Adhoc SSID is the same as | A wireless client using Adhoc structure | legitimate AP. |
6 | has the same SSID as the AP's SSID. For |
| |
the AP's |
| ||
| details, press the Advice button. | Action: | |
|
| ||
|
|
| 1. Contact network administrator. |
|
|
| 2. Try to physically locate the wireless client computers. |
|
|
|
|
|
|
| Description: |
|
|
| Packets with abnormally large duration sent by a client may prevent other clients |
|
|
| from sending packets to the AP. |
|
| Abnormally large duration for packets | Client computer information: |
|
|
| |
7 | Duration Attack | sent by client. For details, press the |
|
|
| Advice button. | Action: |
|
|
| |
|
|
| 1. Try to physically locate the wireless client computer. |
|
|
| 2. Add the Client's MAC address to MAC Access Control List on the AP. |
|
|
|
|
Chapter 6: The Administrative Functions in the Wireless Network Monitor | 56 |
Security Monitor