SMC Networks SMC2552W-G2-17 manual Rogue-ap authenticate, Rogue-ap duration

Models: SMC2552W-G2-17 SMC2552W-G2

1 296
Download 296 pages 22.09 Kb
Page 248
Image 248

Rogue AP Detection Commands 7

Example

Enterprise AP(if-wireless g)#rogue-ap enable

configure either syslog or trap or both to receive the rogue APs detected.

Enterprise AP(if-wireless g)#

rogue-ap authenticate

This command forces the unit to authenticate all access points on the network. Use the no form to disable this function.

Syntax

[no] rogue-ap authenticate

Default Setting

Disabled

Command Mode

Interface Configuration (Wireless)

Command Usage

Enabling authentication in conjunction with a database of approved access points stored on a RADIUS server allows the access point to discover rogue APs. With authentication enabled and a configure RADIUS server, the access point checks the MAC address/Basic Service Set Identifier (BSSID) of each access point that it finds against a RADIUS server to determine whether the access point is allowed. With authentication disabled, the access point can identify its neighboring access points only; it cannot identify whether the access points are allowed or are rogues. If you enable authentication, you should also configure a RADIUS server for this access point (see “RADIUS” on page 6-7).

Example

Enterprise AP(if-wireless g)#rogue-ap authenticate

Enterprise AP(if-wireless g)#

rogue-ap duration

This command sets the scan duration for detecting access points.

Syntax

rogue-ap duration <milliseconds>

milliseconds - The duration of the scan. (Range: 100-1000 milliseconds)

7-111

Page 248
Image 248
SMC Networks SMC2552W-G2 manual Rogue-ap authenticate, Rogue-ap duration, Syntax No rogue-ap authenticate Default Setting