Cisco Cisco Access Registrar 4.2 Specifikace Strana 257

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 636
  • Tabulka s obsahem
  • ŘEŠENÍ PROBLÉMŮ
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 256
5-73
Cisco Wireless LAN Controller Configuration Guide
OL-13826-01
Chapter 5 Configuring Security Solutions
Configuring IDS
Step 2 To see more information on the attacks detected by a particular signature, click the signature type link
for that signature. The Signature Events Detail page appears (see Figure 5-42).
Figure 5-42 Signature Events Detail Page
This page shows the following information:
The MAC addresses of the clients identified as attackers
The method used by the access point to track the attacks
The number of matching packets per second that were identified before an attack was detected
The number of access points on the channel on which the attack was detected
The day and time when the access point detected the attack
Step 3 To see more information for a particular attack, click the Detail link for that attack. The Signature Events
Track Detail page appears (see Figure 5-43).
Figure 5-43 Signature Events Track Detail Page
This page shows the following information:
The MAC address of the access point that detected the attack
The name of the access point that detected the attack
The type of radio (802.11a or 802.11b/g) used by the access point to detect the attack
The radio channel on which the attack was detected
The day and time when the access point reported the attack
Zobrazit stránku 256
1 2 ... 252 253 254 255 256 257 258 259 260 261 262 ... 635 636

Komentáře k této Příručce

Žádné komentáře