LevelOne WAB-1000 manual Rogue AP Detection

Page 31

See Chapter Four for details about bridging.

Rogue AP Detection

The Rogue AP Detection page allows the network administrator to set up rogue AP detection. If you enable rogue AP detection, also enter the MAC address of each AP in the network that you want the AP being configured to accept as a trusted AP. (You may add up to 20 APs.) Enter an email address for notification of any rogue or non-trusted APs. (The MAC address for the WAB-1000 is located on the Wireless Configuration—General page.)

The Rogue AP list, under Monitoring Reports on the navigation menu, will detail any rogue or non-trusted APs.

26

Image 31
Contents User Guide Page Table of Contents WPA Encryption Page Introduction Basic FeaturesWireless Basics 802.11g Network ConfigurationAccess point configurations 802.11bPossible AP Topologies Data Encryption and Security BridgingAES-ECB and 3DES for Bridging WPA with TKIP/ AES-CCMPOperator Authentication and Management MAC Address AuthenticationDhcp Server Management Preparation for use Hardware installationEnsure the cabling is correctly installed Installation InstructionsMinimum system and component requirements Page WAN Indicator LightsSealing Antenna Connections LEDIntroduction Preliminary configuration stepsInitial setup using the Local port General System ConfigurationWAN LAN Wireless Setup Page Dtim RTSSsid EncryptionWPA Encryption Page MAC Address Filtering Bridging and Bridging Encryption Rogue AP Detection Advanced Services Settings Snmp Agent List All Users User ManagementAdd New User Monitoring/ReportsBridging Status System StatusWireless Clients Dhcp Client List Adjacent AP ListSystem Log Web Access LogNetwork Activity Firmware Upgrade System AdministrationFactory Default Remote Logging RebootUtilities General bridge setup Configure the WAB-1000 as a bridgePage Page Point-to-point bridge configuration Set up bridging typeBssid Point-to-point bridging setup guidePage Page Point-to-multipoint bridge configuration Point-to-multipoint bridging setup guide Repeater bridging setup guide Repeater bridge configurationBridging Encryption Radio Frequency Interference Requirements Manufacturer’s StatementChannel Separation and Wlan Cards AES 3DESSnmp DhcpTkip WPA