D-Link DWL-2600AP User Manual - page 731
Detecting and Preventing Wireless Intrusion
D-Link
Unified Wired and Wireless Access System
July 2012
Page 731
D-Link UWS User Manual
When the AP De-Authentication Attack is configured, the WIDS AP Rogue AP Mitigation field on the
AP RF Scan
Status
page shows that the mitigation is in progress.
Figure 448: Rogue AP Mitigation
You can also track the progress of the deauthentication attack on the
WLAN > Monitoring > Access Point >
AP De-Authentication Attack Status
page.
Figure 449: De-Authentication Attack Status
The AP deauthentication attack causes deauthentication frames to be sent to the rogue AP and to clients
communicating with the rogue AP. All clients connected to the rogue AP will experience poor connectivity. The
intent of the attack is to serve as a temporary measure until the rogue AP is located and disabled.
Note:
Radios in non-sentry mode transmit deauthentication frames only on their active channel.
Therefore, D-Link recommends that you deploy radios in sentry mode to effectively implement rogue
AP deauthentication attacks.
Caution!
The deauthentication attack interrupts communication between all APs designated as
rogue
and their stations. Therefore, it is important to make sure all rogue APs are truly rogue before
initiating this attack.