What You Can Do In The Rogue Ap Screen; What You Need To Know - ZyXEL Communications 802.11 a/g User Manual

802.11 a/g dual radio wireless business ap
Hide thumbs Also See for 802.11 a/g:
Table of Contents

Advertisement

Chapter 15 Rogue AP Detection
(the dashed ellipse B) is well-secured, but the rogue AP uses inferior security that
is easily broken by an attacker (X) running readily available encryption-cracking
software. In this example, the attacker now has access to the company network,
including sensitive data stored on the file server (C).

15.2 What You Can Do in the Rogue AP Screen

• Use the Rogue AP > Configuration screen (see
to enable your NWA's Rogue AP detection settings. You can choose to scan for
rogue APs manually, or to have the NWA scan automatically at pre-defined
intervals.
• Use the Rogue AP > Friendly AP screen (see
specify APs as trusted.
• Use the Rogue AP > Rogue AP screen (see
display details of all IEEE 802.11a/b/g wireless access points within the NWA's
coverage area, except for the NWA itself and the access points included in the
friendly AP list.

15.3 What You Need To Know

You can configure the NWA to detect rogue IEEE 802.11a (5 GHz) and IEEE
802.11b/g (2.4 GHz) APs.
You can also set the NWA to e-mail you immediately when a rogue AP is detected
(see
Chapter 19 on page 229
You can set how often you want the NWA to scan for rogue APs in the Rogue AP
> Configuration screen (see
Friendly APs
If you have more than one AP in your wireless network, you must also configure
the list of "friendly" APs. Friendly APs are other wireless access points, aside from
the NWA, that are detected in your network, as well as any others that you know
are not a threat (those from neighboring networks, for example). It is
recommended that you export (save) your list of friendly APs often, especially if
you have a network with a large number of access points. If you do not add them
to the friendly AP list, these access points will appear in the Rogue AP list each
time the NWA scans.
The friendly AP list displays details of all the access points in your area that you
know are not a threat. If you have more than one AP in your network, you need to
configure this list to include your other APs. If your wireless network overlaps with
180
Section 15.3.2 on page
Section 15.3.3 on page
for information on how to set up e-mail logs).
Section 15.3.1 on page
NWA-3500/NWA-3550 User's Guide
Section 15.3.1 on page
184) to
182).
182)
183) to

Advertisement

Table of Contents
loading

This manual is also suitable for:

Nwa-3500Nwa-3550

Table of Contents