Chapter 15 Rogue AP Detection
This scenario can also be part of a wireless denial of service (DoS) attack, in which associated wireless clients are deprived of network access. Other opportunities for the attacker include the introduction of malware (malicious software) into the network.
15.2 Configuration Screen
Use this screen to enable your NWA’s Rogue AP detection settings. Click Rogue AP > Configuration. The following screen appears:
Figure 108 Rogue AP Configuration
The following table describes the labels in this screen.
Table 51 Rogue AP Configuration
LABEL | DESCRIPTION |
Rogue AP Period | Select Enable to turn rogue AP detection on. You must also enter |
Detection | a time value in the Period field. |
| Select No to turn rogue AP detection off. |
|
|
Period (minutes) | Enter the period you want the NWA to wait between scanning for |
| rogue APs (between 10 and 60 minutes). You must also select |
| Enable in the Active Rogue AP Period Detection field. |
|
|
Expiration Time | Specify how long (between 30 and 180 minutes) an AP’s entry can |
(minutes) | remain in the Rogue AP List before the NWA removes it from the |
| list if the AP is no longer active. |
|
|
Friendly AP List |
|
|
|
Export | Click this button to save the current list of friendly APs’ MAC |
| addresses and descriptions (as displayed in the ROGUE AP > |
| Friendly AP screen) to your computer. |
|
|
File Path | Enter the location of a |
| to the NWA. Alternatively, click the Browse button to locate a list. |
|
|
Browse | Click this button to locate a |
| upload to the NWA. |
|
|
190 |
| |
| ||
|
|
|