537

Rogue Detection and

Countermeasures

About Rogues and RF Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 537 Summary of Rogue Detection Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 542 Configuring Rogue Detection Lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 543 Enabling Countermeasures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 548 Disabling or Reenabling Active Scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 549 Enabling AP Signatures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 549 Disabling or Reenabling Logging of Rogues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 550 Enabling Rogue and Countermeasures Notifications . . . . . . . . . . . . . . . . . . . . . . . . 550 IDS and DoS Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 550 Displaying RF Detection Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 561

AP radios automatically scan the RF spectrum for other devices transmitting in the same spectrum. The RF scans discover third-party transmitters in addition to other Nortel radios. WSS Software considers the non-Nortel transmitters to be devices of interest, which are potential rogues.

You can display information about the devices of interest. To identify friendly devices, such as non-Nortel access ports in your network or neighbor’s network, you can add them to the known devices list. You also can enable countermea- sures to prevent clients from using the devices that truly are rogues.

With WLAN Management Software , you also can display the physical location of a rogue device. (For more informa- tion, see the Nortel WLAN Management Software Reference Manual.)

About Rogues and RF Detection

RF detection detects all the IEEE 802.11 devices in a Mobility Domain and can single out the unauthorized rogue access points.

Nortel WLAN Security Switch 2300 Series Configuration Guide

Page 537
Image 537
Nortel Networks 2300 manual Rogue Detection Countermeasures, About Rogues and RF Detection