Rogue Ap Detection - Cisco WAP121 Administration Manual

Wireless-n access point with poe wireless-n selectable-band access point with poe
Hide thumbs Also See for WAP121:
Table of Contents

Advertisement

Wireless

Rogue AP Detection

STEP 5
!
CAUTION
Rogue AP Detection
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
-
On — A station is required to send a TSPEC request for bandwidth to the
WAP device before sending or receiving a video traffic stream. The WAP
device responds with the result of the request, which includes the
allotted medium time if the TSPEC was admitted.
-
Off — A station can send and receive video priority traffic without
requiring an admitted TSPEC; the WAP device ignores video TSPEC
requests from client stations.
TSPEC Video ACM Limit—The upper limit on the amount of traffic that the
WAP device attempts to transmit on the wireless medium using a video AC
to gain access. The default limit is 15 percent of total traffic.
TSPEC AP Inactivity Timeout—The amount of time for a WAP device to
detect a downlink traffic specification as idle before deleting it. The valid
integer range is from 0 to 120 seconds and the default is 30 seconds.
TSPEC Station Inactivity Timeout—The amount of time for a WAP device
to detect an uplink traffic specification as idle before deleting it. The valid
integer range is from 0 to 120 seconds and the default is 30 seconds.
TSPEC Legacy WMM Queue Map Mode—Enables or disables the
intermixing of legacy traffic on queues operating as ACM. By default, this
mode is off.
Click Save. The changes are saved to the Startup Configuration.
After new settings are saved, the corresponding processes may be stopped and
restarted. When this happens, the WAP device may lose connectivity. We
recommend that you change WAP device settings when a loss of connectivity will
least affect your wireless clients.
A Rogue AP is an access point that has been installed on a secure network without
explicit authorization from a system administrator. Rogue access points pose a
security threat because anyone with access to the premises can ignorantly or
maliciously install an inexpensive wireless WAP device that can potentially allow
unauthorized parties to access the network.
5
69

Advertisement

Table of Contents
loading

This manual is also suitable for:

Wap321

Table of Contents