0

Out of 0 Ratings

Owner's of the D-Link Video Game Controller d-link wireless controller gave it a score of 0 out of 5. Here's how the scores stacked up:
  • Reliability

    0 out of 5
  • Durability

    0 out of 5
  • Maintenance

    0 out of 5
  • Performance

    0 out of 5
  • Ease of Use

    0 out of 5
of 181
 
Wireless Controller User Manual
156
AP is operating on an illegal channel: The purpose of this test is to detect hackers
or incorrectly configured devices that are operating on channels that are not legal in
the country where the wireless system is set up. Note: In order for the wireless
system to detect this threat, the wireless network must contain one or more radios
that operate in sentry mode.
Standalone AP with unexpected configuration: If the AP is classified as a known
standalone AP, then the controller checks whether the AP is operating with the
expected configuration parameters. You configure the expected parameters for the
standalone AP in the local or RADIUS Valid AP database. This test may detect
network misconfiguration as well as potential intrusion attempts. The following
parameters are checked:
• Channel Number
• SSID
• Security Mode
• WDS Mode.
• Presence on a wired network.
Unexpected WDS device detected on network: If the AP is classified as a
Managed or Unknown AP and wireless distribution system (WDS) traffic is
detected on the AP, then the AP is considered to be Rogue. Only stand-alone APs
that are explicitly allowed to operate in WDS mode are not reported as rogues by
this test.
Unmanaged AP detected on wired network: This test checks whether the AP is
detected on the wired network. If the AP state is Unknown, then the test changes
the AP state to Rogue. The flag indicating whether AP is detected on the wired
network is reported as part of the RF Scan report. If AP is managed and is detected
on the network then the controller simply reports this fact and doesn't change the
AP state to Rogue. In order for the wireless system to detect this threat, the
wireless network must contain one or more radios that operate in sentry mode
Rogue Detected Trap Interval: Specify the interval, in seconds, between
transmissions of the SNMP trap telling the administrator that rogue APs are present
in the RF Scan database. If you set the value to 0, the trap is never sent.
Wired Network Detection Interval: Specify the number of seconds that the AP
waits before starting a new wired network detection cycle. If you set the value to 0,
wired network detection is disabled