
Configuring Access Point Security 6-55
3. Use the Allowed AP List field to restrict Symbol AP’s from Rogue AP detection and create a 
list of device MAC addresses and ESSID’s approved for interoperability with the AP-5131.RF Scan by MU Select the RF Scan by MU checkbox to enable MUs to scan for 
potential rogue APs within the network. Define an interval in the 
Scan Interval field for associated MUs to beacon in an attempt to 
locate a rogue AP. Set the interval to a value sooner than the 
default if a large volume of device network traffic is anticipated 
within the coverage area of the target AP-5131 access point. The 
Scan Interval field is not available unless the RF Scan by MU 
checkbox is selected. Symbol clients must be associated and have 
rogue AP detection enabled. 
RF On-Channel 
Detection
Select the RF On-Channel Detection checkbox to enable the 
AP-5131 to detect rogue APs on its current (legal) channel setting.
RF Scan by Detector 
Radio
If the AP-5131 supports a dual-radio SKU, select the RF Scan by 
Detector Radio checkbox to enable the selected 11a or 11b/g 
radio to scan for rogue APs.
Authorize Any AP 
Having Symbol 
Defined MAC Address
Select this checkbox to enable all access points with a Symbol 
MAC address to interoperate with the AP-5131 conducting a scan 
for rogue devices.
Add Click Add to display a single set of editable MAC address and ESS 
address values. 
Del (Delete) Click the Delete button to remove the highlighted line from the 
Rule Management field. The MAC and ESS address information 
previously defined is no longer applicable unless the previous 
configuration is restored.
Delete All Click the Delete All button to remove all entries from the Rule 
Management field. All MAC and ESS address information 
previously defined is no longer applicable unless the previous 
configuration is restored.
Any MAC Select the Any MAC checkbox to prevent a device’s MAC address 
(whether it is a known device MAC address or not) from being 
considered a rogue device.
MAC Address Click Add, and enter the device MAC address to be excluded from 
classification as a rogue device.