SonicOS 7.1 Access Points
- SonicOS 7.1 Access Points
- About SonicOS
- About Access Points
- Settings
- Synchronize Access Points
- Provisioning Overview
- Creating/Modifying Provisioning Profiles
- Adding/Editing a Provisioning Profile - Getting Started
- General Settings for Provisioning Profiles
- 5GHz/2.4GHz Radio Basic Settings for Provisioning Profiles
- 5GHz/2.4GHz Radio Advanced Settings for Provisioning Profiles
- Sensor Settings for WIDP in Provisioning Profiles
- Mesh Network Settings for Provisioning Profiles
- 3G/4G/LTE WWAN Settings for Provisioning Profiles
- Bluetooth LE Settings for Provisioning Profiles
- Deleting Access Point Profiles
- Product Specific Configuration Notes
- Managing Access Point Objects
- Firmware Management
- Floor Plan View
- Station Status
- Intrusion Detection Services
- Advanced IDP
- Packet Capture
- Virtual Access Points
- RF Monitoring
- RF Analysis
- RF Spectrum
- FairNet
- Wi-Fi Multimedia
- 3G/4G/LTE WWAN
- Bluetooth LE Devices
- Radio Management
- SonicWall Support
802.11 Data Frame Setting
The 802.11 Data Frame Setting panel is used to configure your data frame settings and displays the number of threats for each setting.
To enable any of the settings, toggle the radio button for that option. Click Accept to save the settings. By default, Unassociated Station option is not enabled; the others are enabled. The following table describes the settings.
Name | Description |
---|---|
Total Data Threats | Displays the total number of data threats. |
Unassociated Station |
A wireless station attempts to authenticate prior to associating with an access point, the unassociated station can create a DoS by sending a flood of authentication requests to the access point while still unassociated. |
NetStumbler Detection | Typically used to locate both free Internet access as well as interesting networks. NetStumbler interfaces with a GPS receiver and mapping software to automatically map out locations of wireless networks. NetStumbler is also used by attackers to retrieve information from surrounding wireless networks. |
EAPOL Packet Flood | Extensible Authentication Protocol over LAN (EAPOL) packets are used in WPA and WPA2 authentication mechanisms. As these packets, like other authentication request packets, are received openly by wireless access points, a flood of these packets can result in DoS to your wireless network. |
Weak WEP IV | WEP security mechanism uses your WEP key along with a randomly chosen 24-bit number known as an Initialization Vector (IV) to encrypt data. Network attackers often target this type of encryption because some of the random IV numbers are weaker than others, making it easier to decrypt your WEP key. |
Was This Article Helpful?
Help us to improve our support portal