Rogue Access Points - Fluke AIRCHECK User Manual

Wi-fi tester
Hide thumbs Also See for AIRCHECK:
Table of Contents

Advertisement

Ad hoc client devices communicate directly with other clients,
not through an access point. These devices can give hackers
access to data transmitted on the network. (Some IT policies for
networks allow ad hoc devices.)

Rogue Access Points

The Rogue Access Points test indicates whether
unauthorized access points are detected with a rating of
Pass,
Warning, or
all rogue access points heard at your location.
Identification of rogue access points requires
configuration of Access Control List (ACL). The Rogue
Access Point Test is disabled by default. However, when
it is enabled, it runs as part of AutoTest. To enable the
Rogue Access Point Test, select Tools > Threshold /
AutoTest Settings > Rogue AccessPoint Test.
Initially, all access points are set to a default status of
Unknown, but may also be set to Authorized. See page 46.
Fail. Results include a list of
Using AutoTest to Diagnose Your Network Health
To set the ACL status, go to the home screen, and select the
Access Points screen. Then select
access point. Select Set all APs to Authorized to set the
status of all access points discovered to "Authorized." This
can also be done in the AutoTest > Rogue Access Points
screen by selecting ACL, highlighting the access point, and
selecting ACL again. Place a check next to the following
authorization type and press the back button
If you change the ACL in AutoTest, you must rerun
AutoTest for the changes to apply.
Unauthorized device
Authorized device
Neighbor device
Unknown device
Flagged device
Set all APs to Authorized
Set all AP Series to Authorized
Set all AP Series to Unauthorized
ACL, and edit each
.
Note
27

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents