Rogue AP Detection
Rogue AP Detection
This feature scans the airwaves and collects information about access points in the area.
The term “rogue AP” is used to describe an access point that is not authorized to participate on the network. It may not have the proper security settings in place. Rogue AP’s can potentially allow unauthorized users access to the network. In addition, a legitimate client may mistakenly associate to a rogue AP with invalid encryption settings and not to the AP that has been configured for it to use. This can cause a denial of service problem.
It lists access points found during the scan on the Neighbor AP Detection Status page after the scan is complete.
If you enable the RADIUS authentication setting, this feature also identifies rogue APs. It performs a RADIUS server look up for the MAC address of each access point found. It reports access points whose MAC addresses it finds in the RADIUS server on the Neighbor AP Detection Status page. It reports access points whose MAC addresses it does not find as rogue APs in the syslog. Refer to System Log on page 4‐45. Rogue access points can be identified by unknown BSSID (MAC address) or SSID configuration
Using Web Management to Configure Rogue AP Detection
Select Rogue AP Detection from the menu. The Rogue AP Detection selections are displayed in the following screen.
RoamAbout