Chapter 15 Rogue AP Detection

(the dashed ellipse B) is well-secured, but the rogue AP uses inferior security that is easily broken by an attacker (X) running readily available encryption-cracking software. In this example, the attacker now has access to the company network, including sensitive data stored on the file server (C).

15.2What You Can Do in the Rogue AP Screen

Use the Rogue AP > Configuration screen (see Section 15.3.1 on page 182) to enable your NWA’s Rogue AP detection settings. You can choose to scan for rogue APs manually, or to have the NWA scan automatically at pre-defined intervals.

Use the Rogue AP > Friendly AP screen (see Section 15.3.2 on page 183) to specify APs as trusted.

Use the Rogue AP > Rogue AP screen (see Section 15.3.3 on page 184) to display details of all IEEE 802.11a/b/g wireless access points within the NWA’s coverage area, except for the NWA itself and the access points included in the friendly AP list.

15.3What You Need To Know

You can configure the NWA to detect rogue IEEE 802.11a (5 GHz) and IEEE 802.11b/g (2.4 GHz) APs.

You can also set the NWA to e-mail you immediately when a rogue AP is detected (see Chapter 19 on page 229 for information on how to set up e-mail logs).

You can set how often you want the NWA to scan for rogue APs in the Rogue AP > Configuration screen (see Section 15.3.1 on page 182).

Friendly APs

If you have more than one AP in your wireless network, you must also configure the list of “friendly” APs. Friendly APs are other wireless access points, aside from the NWA, that are detected in your network, as well as any others that you know are not a threat (those from neighboring networks, for example). It is recommended that you export (save) your list of friendly APs often, especially if you have a network with a large number of access points. If you do not add them to the friendly AP list, these access points will appear in the Rogue AP list each time the NWA scans.

The friendly AP list displays details of all the access points in your area that you know are not a threat. If you have more than one AP in your network, you need to configure this list to include your other APs. If your wireless network overlaps with

180

 

NWA-3500/NWA-3550 User’s Guide