Motorola WS5100 Series Reference Manual page 33

Hide thumbs Also See for WS5100 Series:
Table of Contents

Advertisement

802.1x authentication is conducted:
• At power up
• On an AP300 operator initiated reset (such as pulling Ethernet cable)
• When the switch administrator initiates a reset of the AP300.
• When re-authentication is initiated by the Authenticator (say the switch in between)
Change Username/Password after AP Adoption
Once the AP300 is adopted using 802.1x authentication (say default username/password) OR using a non-
secure access method (hub or switch without 802.1x enabled), use the CLI/SNMP/UI to reconfigure the
username/password combination.
Reset Username/Password to Factory Defaults
To restore the AP300 username/password to factory defaults, adopt the AP300 using a non-secure access
method (a hub or switch without 802.1x enabled), then reconfigure the username/password combination.
The access port does not make use of any parameters (such as MAC based authentication, VLAN based etc.)
configured on Radius Server.
1.2.5.8 WIDS
The Motorola Wireless Intrusion Dectection System (WIDS) monitors for any presence of unauthorized rogue
access points. Unauthorized attempts to access the WLAN is generally accompanied by anomalous behavior
as intruding MUs try to find network vulnerabilities. Basic forms of this behavior can be monitored and
reported without needing a dedicated WIDS. When the parameters exceed a configurable threshold, the
switch generates an SNMP trap and reports the result via the management interfaces. Basic WIDS
functionality does not require monitoring APs and does not perform off-channel scanning.
NOTE: When converting an AP300 to an Intrusion Detection Sensor, the conversion
requires approximately 60 seconds.
1.2.5.9 Rogue AP Detection
The switch supports the following techniques for rogue AP detection:
RF scan by Access Port on all channels
SNMP Trap on discovery
Authorized AP Lists
Rogue AP Report
Motorola RFMS Support
NOTE: The Motorola RF Management Software is recommended to plan the deployment
of the switch. Motorola RFMS can help optimize the positioning and configuration of a
switch in respect to a WLAN's MU throughput requirements and can help detect rogue
devices. For more information, refer to the Motorola Web site.
1-23
Overview

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents