Installation guide

Switch Security
6-13
3. Select a detected MU and click the Delete button to remove it from the list of MUs you are tracking
as potential threats within the switch managed network.
4. Click on the Export button to export the contents of the table to a Comma Separated Values file
(CSV).
Violation Type Displays the reason the violation occurred for each detected MU.
Use the Violation Type to discern whether the detected MU is truly
a threat on the switch managed network (and must be removed) or
can be interpreted as a non threat. The following violation types
are possible:
Excessive Probes
Excessive Association
Excessive Disassociation
Excessive Authentication failure
Excessive Crypto replays
Excessive 802.11 replays
Excessive Decryption failures
Excessive Unassociated Frames
Excessive EAP Start Frames
Null destination
Same source/destination MAC
Source multicast MAC
Weak WEP IV
TKIP Countermeasures
Invalid Frame Length
Excessive EAP-NAKS
Invalid 802.1x frames
Invalid Frame Type
Beacon with broadcast ESSID
Frames with known bad ESSIDs
Unencrypted traffic
Frames with non-changing WEP IV
NOTE: The following violation types require the access port be in
scan mode:
Beacon with broadcast ESSID
Frames with known bad ESSIDs
Time Remaining Displays the time remaining before the next filter activity. Detected
MUs are removed from the filtered list when they no longer violate
the thresholds defined within the Configuration tab.