Setting Snmp Traps For Rogue Aps - Motorola WS2000 - Wireless Switch - Network Management Device System Reference Manual

Wireless switch
Hide thumbs Also See for WS2000 - Wireless Switch - Network Management Device:
Table of Contents

Advertisement

5-36 WS2000 Wireless Switch System Reference Guide
Details About the Rogue Detector
The lower portion of the Rogue AP Detail screen displays information about the AP that detected the rogue.
This information if provided to the administrator to help located the rogue.
Finder's MAC
Closest AP MAC
Closest AP Name
Scan Method
First Seen
Last Seen
NOTE: The WS 2000 Wireless Switch only reports rogue APs. It is up to the administrator to change
security settings or disrupt the rogue AP's connection.

5.9.4 Setting SNMP Traps for Rogue APs

It is also possible to set a trap for a rogue AP.
1. Go to
[System Configuration]
This is the MAC address for the AP that detected the rogue AP.
This is the MAC address for the AP that is physically closest to the rogue AP.
This is the name of the AP that is physically closest to the rogue AP.
This is the scan method that was used to detect the rogue AP. The possible values are:
• MU (detected by a mobile unit)
• Detector (detected by the Detector AP)
• On Channel (detected by non-detector AP)
This is the number of hours:minutes:seconds since the rogue AP was first noticed on the
network.
This is the number of hours:minutes:seconds since the rogue AP was last noticed on the
network.
-->
SNMP Access
-->
SNMP Traps
from the navigation menu.

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents