Rogue Ap Detection - 3e Technologies International 3e-531AP User Manual

Table of Contents

Advertisement

3e-531AP Wireless Access Point

Rogue AP Detection

The Rogue AP Detection page allows the network administrator to set
up rogue AP detection. If you enable rogue AP detection, also enter the
MAC Address of each AP in the network that you want the AP being con-
figured to accept as a trusted AP. (You may add up to 20 APs.) Enter an
email address for notification of any rogue or non-trusted APs. (The MAC
Address for the 3e-531AP is located on the Setup—General page.
The Rogue AP list, under Monitoring Reports on the navigation
menu, will detail any marauding APs.
802.1x
802.1x is not available if you are using the FIPS 140-2 secure setup
mode. 802.1x is a means of making a WEP encrypted system more secure.
Enabling 802.1x requires that you have at least one remote Radius
server (preferably also a backup Radius server) but it will allow the use of
the legacy WEP encrypton key system with greater resultant security.
IEEE 802.1X offers an effective framework for authenticating and con-
trolling user traffic to a protected network, as well as dynamically varying
encryption keys. 802.1X ties a protocol called EAP (Extensible Authentica-
tion Protocol) to both the wired and wireless LAN media and supports
multiple authentication methods, such as token cards, Kerberos, one-time
passwords, certificates, and public key authentication.
If using 802.1x, you must know and input the IP addess, Port Number
and Shared Secret for the primary and backup Radius server and the key
type selected on your Wireless Encryption page. Then set the accepted
lifetime for the encryption key.
24
Chapter 3: Access Point Configuration
29000125-001 C

Advertisement

Table of Contents
loading

Table of Contents