Examples: The following command shows counters for rogue activity detected by a switch:

DWS-1008#show rfdetect countermeasures

 

 

Type

Current

Total

------------------------------------------------------------------------------------------------------------

Rogue access points

0

0

Interfering access points

139

1116

Rogue 802.11 clients

0

0

Interfering 802.11 clients

4

347

802.11 adhoc clients

0

1

Unknown 802.11 clients

20

965

Interfering 802.11 clients seen on wired network

0

0

802.11 probe request flood

0

0

802.11 authentication flood

0

0

802.11 null data flood

0

0

802.11 mgmt type 6 flood

0

0

802.11 mgmt type 7 flood

0

0

802.11 mgmt type d flood

0

0

802.11 mgmt type e flood

0

0

802.11 mgmt type f flood

0

0

802.11 association flood

0

0

802.11 reassociation flood

0

0

802.11 disassociation flood

0

0

Weak wep initialization vectors

0

0

Spoofed access point mac-address attacks

0

0

Spoofed client mac-address attacks

0

0

Ssid masquerade attacks

1

12

Spoofed deauthentication attacks

0

0

Spoofed disassociation attacks

0

0

Null probe responses

626

11380

Broadcast deauthentications

0

0

FakeAP ssid attacks

0

0

FakeAP bssid attacks

0

0

Netstumbler clients

0

0

Wellenreiter clients

0

0

Active scans

1796

4383

Wireless bridge frames

196

196

Adhoc client frames

8

0

Access points present in attack-list

0

0

Access points not present in ssid-list

0

0

Access points not present in vendor-list

0

0

Clients not present in vendor-list

0

0

Clients added to automatic black-list

0

0

D-Link DWS-1008 CLI Manual

279

Page 282
Image 282
D-Link dws-1008 manual DWS-1008#show rfdetect countermeasures, Type Current