Chapter 15 Rogue AP Detection

This scenario can also be part of a wireless denial of service (DoS) attack, in which associated wireless clients are deprived of network access. Other opportunities for the attacker include the introduction of malware (malicious software) into the network.

15.2 Configuration Screen

Use this screen to enable your NWA’s Rogue AP detection settings. Click Rogue AP > Configuration. The following screen appears:

Figure 108 Rogue AP Configuration

The following table describes the labels in this screen.

Table 51 Rogue AP Configuration

LABEL

DESCRIPTION

Rogue AP Period

Select Enable to turn rogue AP detection on. You must also enter

Detection

a time value in the Period field.

 

Select No to turn rogue AP detection off.

 

 

Period (minutes)

Enter the period you want the NWA to wait between scanning for

 

rogue APs (between 10 and 60 minutes). You must also select

 

Enable in the Active Rogue AP Period Detection field.

 

 

Expiration Time

Specify how long (between 30 and 180 minutes) an AP’s entry can

(minutes)

remain in the Rogue AP List before the NWA removes it from the

 

list if the AP is no longer active.

 

 

Friendly AP List

 

 

 

Export

Click this button to save the current list of friendly APs’ MAC

 

addresses and descriptions (as displayed in the ROGUE AP >

 

Friendly AP screen) to your computer.

 

 

File Path

Enter the location of a previously-saved friendly AP list to upload

 

to the NWA. Alternatively, click the Browse button to locate a list.

 

 

Browse

Click this button to locate a previously-saved list of friendly APs to

 

upload to the NWA.

 

 

190

 

NWA-3500/NWA-3550 User’s Guide