Wireless-G Business USB Network Adapter with RangeBooster
|
| Table 1: Alerts | ||
|
|
|
| |
Item | Alert | Description | Advice | |
|
|
|
| |
|
|
| Description: | |
|
|
| New wireless client computer is detected. | |
|
| New client is detected. For details, | Action: | |
15 | New Client Detected | 1. Contact the network administrator and inform the administrator about the new | ||
press the Advice button. | ||||
|
| client computer's SSID and MAC address. | ||
|
|
| ||
|
|
| 2. The new Client needs to be classified and the classification table needs to be | |
|
|
| updated. | |
|
|
|
| |
|
|
| Description: | |
|
|
| Data packets are being transferred at a very slow rate. Possible cause may be a | |
|
|
| poor signal reception due to some interference or the client is too far away from | |
|
|
| the AP. | |
16 | Low Speed Connection | Connection is at low speed. For details, |
| |
press the Advice button. | Action: | |||
|
| |||
|
|
| 1. Check the environment and find possible causes for wireless signal interference, | |
|
|
| e.g., a microwave oven or a cordless telephone. | |
|
|
| 2. Check the MAC association table on the AP for any illegitimate wireless clients. | |
|
|
|
| |
|
|
| Description: | |
|
|
| A Rogue AP is detected doing an illegal action. The AP is using the same SSID and | |
|
|
| encryption as the Trusted AP and is trying to crack the client computer's encryption | |
|
|
| key. During the decryption process, the AP has a | |
17 | Rogue AP Detected | Rogue AP is detected. For details, press | compromised, the client computer will detect a MIC error, indicating a Rogue AP. | |
the Advice button. |
| |||
|
|
| ||
|
|
| Action: | |
|
|
| 1. Contact network administrator. | |
|
|
| 2. Try to physically locate the Access Point. | |
|
|
|
|
Chapter 6: The Administrative Functions in the Wireless Network Monitor | 59 |
Security Monitor