Rogue Ap Detection - 3e Technologies International 3e-531AP User Manual

Table of Contents

Advertisement

3e-531AP Wireless Access Point

Rogue AP Detection

The Rogue AP Detection page allows the network administrator to
set up rogue AP detection. If you enable rogue AP detection, also enter
the MAC Address of each AP in the network that you want the AP being
configured to accept as a trusted AP. (You may add up to 20 APs.) Enter
an email address for notification of any rogue or non-trusted APs.
The Rogue AP list, under Monitoring Reports on the navigation
menu, will detail any marauding APs.
802.1x
Enabling 802.1x requires that you have at least one remote Radius
server (preferably also a backup Radius server) but it will allow the use of
the legacy WEP encrypton key system with greater resultant security.
IEEE 802.1X offers an effective framework for authenticating and con-
trolling user traffic to a protected network, as well as dynamically varying
encryption keys. 802.1X ties a protocol called EAP (Extensible Authentica-
tion Protocol) to both the wired and wireless LAN media and supports
multiple authentication methods, such as token cards, Kerberos, one-time
passwords, certificates, and public key authentication.
If using 802.1x, you must know and input the IP addess, Port Number
and Shared Secret for the primary and backup Radius server and the key
type selected on your Wireless Encryption page. Then set the accepted
lifetime for the encryption key.
This is shown on the next page.
50
Chapter 4 Gateway Configuration
29000125-001 C

Advertisement

Table of Contents
loading

Table of Contents