Defining Wireless Rogue Handling - 3Com 3CRUS2475 User Manual

Unified gigabit wireless poe switch 24
Hide thumbs Also See for 3CRUS2475:
Table of Contents

Advertisement

164
C
8: D
HAPTER
EFINING
Defining Wireless
Rogue Handling
WLAN
level as a wired LAN. WEP encrypts data over radio waves during
the packet transmission. WEP keys are 40 bit or 104 bit encryption
keys.
WPA-PSK — Indicates that Wi-Fi Protected Access (WPA) is the
selected WLAN security method. WPA is based on WEP, but
provides enhanced encryption using Temporal Key Integrity
Protocol (TKIP). In addition, WPA improves authentication using
EAP. EAP ensures that only authorized network users access the
network though secure encryption systems.
WPA2-PSK — Indicates that WPA2-PSK is the selected WLAN
security method. WPA2-PSK improves system security by
encrypting signals at a higher bit rates.
Passphrase/Key — Indicates the encryption key type.
2 Define the fields.
3 Click
. The Wireless Configuration is saved at the end of the
wizard setup, and the device is updated.
Access points are constantly scanning wireless channels. Scanning occurs
while WLAN stations are being serviced. The WLAN rogue contains
information for viewing WLAN rogue statistics. Access points then report
the discovered neighbors to the system. The system filters the
information and looks for rogue neighbors or known SSIDs. Access points
are considered rouges if: An issue occurs in the security configuration.
The access point is located in an Ad-hoc network.
A Organizationally Unique Identifier (OUI) is detected in the rogue BSSID.
WLAN rogues can cause disrupt WLAN service, in addition, stations which
are connected to the rogue AP are disconnected.

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents