Overview
Authorized AP Lists
Configure a list of authorized Access Points based on their MAC addresses. The controller evaluates the
APs against the configured authorized list after obtaining Rogue AP information from one of the 2
mechanisms as mentioned in
Rogue AP Report
After determining which are authorized APs and which are Rogue, the controller prepares a report.
Extreme Networks WMS Support
The controller can provide rogue device detection data to the Extreme Networks Wireless LAN
Controller Wireless Management Suite application (or Extreme Networks WMS). Extreme Networks
WMS uses this data to refine the position and display the rogue on a site map representative of the
physical dimensions of the actual radio coverage area of the controller. This is of great assistance in the
quick identification and removal of unauthorized devices.
ACLs
ACLs control access to the network through a set of rules. Each rule specifies an action taken when a
packet matches a set of rules. If the action is deny, the packet is dropped. If the action is permit, the
packet is allowed. If the action is to mark, the packet is tagged for priority. The controller supports the
following types of ACLs:
NOTE
An ACL is located at the AP for locally bridged traffic and at the controller for tunneled traffic.
IP Standard ACLs
●
IP Extended ACLs
●
MAC Extended ACLs
●
Wireless LAN ACLs
●
For information on creating an ACL, see
Local Radius Server
Radius is a common authentication protocol utilized by the 802.1x wireless security standard. Radius
improves the WEP encryption key standard, in conjunction with other security methods such as EAP-
PEAP. The controller has one internal Radius server. For information on configuring the controller's
resident Radius Server, see
IPSec VPN
IP Sec is a security protocol providing authentication and encryption over the Internet. Unlike SSL
(which provides services at layer 4 and secures two applications), IPsec works at Layer 3 and secures
the network. Also unlike SSL (which is typically built into the Web browser), IPsec requires a client
installation. IPsec can access both Web and non-Web applications, whereas SSL requires workarounds
for non-Web access such as file sharing and backup.
32
"Rogue AP Detection" on page
"Configuring Firewalls and Access Control Lists" on page
"Configuring the Radius Server" on page
31.
396.
Summit WM3000 Series Controller System Reference Guide
319.