CHAPTER 6: COMMAND LINE INTERFACE

The access point can be configured to periodically scan all radio channels and find other access points within range. A database of nearby access points is maintained where any rogue APs can be identified.

Table 26 Rogue AP Commands

Command

Function

Mode

Page

 

 

 

 

rogue-ap enable

Enables the periodic detection of other nearby access

GC

6-134

 

points

 

 

rogue-ap authenticate

Enables identification of all access points

GC

6-135

rogue-ap duration

Sets the duration that all channels are scanned

GC

6-136

rogue-ap interval

Sets the time between each scan

GC

6-136

rogue-ap scan

Forces an immediate scan of all radio channels

GC

6-137

show rogue-ap

Shows the current database of detected access points

Exec

6-139

 

 

 

 

rogue-ap enable

This command enables the periodic detection of nearby access points. Use the no form to disable periodic detection.

Syntax

[no] rogue-ap enable

Default Setting

Disabled

Command Mode

Interface Configuration (Wireless)

Command Usage

While the access point scans a channel for rogue APs, wireless clients will not be able to connect to the access point. Therefore, avoid frequent scanning or scans of a long duration unless there is a reason to believe that more intensive scanning is required to find a rogue AP.

A “rogue AP” is either an access point that is not authorized to participate in the wireless network, or an access point that does not have the correct security configuration. Rogue access points can be identified by unknown BSSID (MAC address) or SSID configuration. A database of nearby access points should therefore be maintained on a RADIUS server, allowing any rogue APs to be identified (see “rogue-ap authenticate” on page 135).

6-134

Page 246
Image 246
3Com 3CRWEASYA73, WL-575 manual Rogue-ap enable, Rogue AP Commands