Enterasys Networks RBT-4102 manual Rogue AP Detection

Models: RBT-4102

1 168
Download 168 pages 49.88 Kb
Page 63
Image 63
Rogue AP Detection

Rogue AP Detection

Rogue AP Detection

This feature scans the airwaves and collects information about access points in the area.

The term “rogue AP” is used to describe an access point that is not authorized to participate on the network. It may not have the proper security settings in place. Rogue AP’s can potentially allow unauthorized users access to the network. In addition, a legitimate client may mistakenly associate to a rogue AP with invalid encryption settings and not to the AP that has been configured for it to use. This can cause a denial of service problem.

It lists access points found during the scan on the Neighbor AP Detection Status page after the scan is complete.

If you enable the RADIUS authentication setting, this feature also identifies rogue APs. It performs a RADIUS server look up for the MAC address of each access point found. It reports access points whose MAC addresses it finds in the RADIUS server on the Neighbor AP Detection Status page. It reports access points whose MAC addresses it does not find as rogue APs in the syslog. Refer to System Log on page 4‐45. Rogue access points can be identified by unknown BSSID (MAC address) or SSID configuration

Using Web Management to Configure Rogue AP Detection

Select Rogue AP Detection from the menu. The Rogue AP Detection selections are displayed in the following screen.

RoamAbout RBT-4102 Wireless Access Point Configuration Guide 4-27

Page 63
Image 63
Enterasys Networks RBT-4102 manual Using Web Management to Configure Rogue AP Detection