Wireless
Rogue AP De tection
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE 69
5
-On — A station is required to send a TSPEC request for bandwidth to the
WAP device before sending or receiving a video traffic stream. The WAP
device responds with the result of the request, which includes the
allotted medium time if the TSPEC was admitted.
-Off — A station can send and receive video priority traffic without
requiring an admitted TSPEC; the WAP device ignores video TSPEC
requests from client stations.
TSPEC Video ACM Limit—The upper limit on the amount of traffic that the
WAP device attempts to transmit on the wireless medium using a video AC
to gain access. The default limit is 15 percent of total traffic.
TSPEC AP Inactivity Timeout—The amount of time for a WAP device to
detect a downlink traffic specification as idle before deleting it. The valid
integer range is from 0 to 120 seconds and the default is 30 seconds.
TSPEC Station Inactivity Timeout—The amount of time for a WAP device
to detect an uplink traffic specification as idle before deleting it. The valid
integer range is from 0 to 120 seconds and the default is 30 seconds.
TSPEC Legacy WMM Queue Map Mode—Enables or disables the
intermixing of legacy traffic on queues operating as ACM. By default, this
mode is off.
STEP 5 Click Save. The changes are saved to the Startup Configuration.
!
CAUTION After new settings are saved, the corresponding processes may be stopped and
restarted. When this happens, the WAP device may lose connectivity. We
recommend that you change WAP device settings when a loss of connectivity will
least affect your wireless clients.
Rogue AP Detection
A Rogue AP is an access point that has been installed on a secure network without
explicit authorization from a system administrator. Rogue access points pose a
security threat because anyone with access to the premises can ignorantly or
maliciously install an inexpensive wireless WAP device that can potentially allow
unauthorized parties to access the network.