Rogue-Ap Authenticate - 3Com 3CRWEASYA73 / WL-575 User Manual

Outdoor 11a building to building bridge and 11bg access point
Hide thumbs Also See for 3CRWEASYA73 / WL-575:
Table of Contents

Advertisement

C
6: C
L
HAPTER
OMMAND
INE
Example
AP (if-wireless g)#rogue-ap enable
configure either syslog or trap or both to receive the rogue APs detected.
AP (if-wireless g)#

rogue-ap authenticate

This command forces the unit to authenticate all access points on the network.
Use the no form to disable this function.
Syntax
Default Setting
Command Mode
Command Usage
I
NTERFACE
scanning or scans of a long duration unless there is a reason to believe that
more intensive scanning is required to find a rogue AP.
• A "rogue AP" is either an access point that is not authorized to participate
in the wireless network, or an access point that does not have the correct
security configuration. Rogue access points can be identified by unknown
BSSID (MAC address) or SSID configuration. A database of nearby access
points should therefore be maintained on a RADIUS server, allowing any
rogue APs to be identified (see "rogue-ap authenticate" on page 160).
The rogue AP database can be viewed using the show rogue-ap
command.
• The access point sends Syslog messages for each detected access point
during a rogue AP scan.
[no] rogue-ap authenticate
Disabled
Interface Configuration (Wireless)
Enabling authentication in conjunction with a database of approved access
points stored on a RADIUS server allows the access point to discover rogue
APs. With authentication enabled and a configured RADIUS server, the
access point checks the MAC address/Basic Service Set Identifier (BSSID) of
each access point that it finds against a RADIUS server to determine whether
the access point is allowed. With authentication disabled, the access point
can identify its neighboring access points only; it cannot identify whether
6-160

Advertisement

Table of Contents
loading

Table of Contents