Rogue AP Detection
Using Web Management
Select Rogue AP Detection from the menu. The Rogue AP Detection selections are displayed in the following screen.
•RADIUS Authentication enables the access point to discover rogue access points. Enabling RADIUS Authentication causes the access point to check the MAC address/Basic Service Set Identifier (BSSID) of each access point that it finds against a RADIUS server to determine whether the access point is allowed. With RADIUS authentication disabled, the access point can identify its neighboring access points only; it cannot identify whether the access points are allowed or are rogues. If you enable RADIUS authentication, you must configure a RADIUS server (on the RADIUS page) for this access point.
•AP Scan Interval specifies the wait‐time between scans. Default: 720 minutes between scans.
•AP Scan Duration specifies the amount of time to scan each frequency channel. Default: 350 milliseconds.
•AP Scan Now button scans for the specified interface.
•Scan All button scans for all 802.11a and 802.11b/g interfaces.