Configuring Rogue Ap Detection - Extreme Networks Altitude 4700 Series Product Reference Manual

Software version 4.1
Hide thumbs Also See for Altitude 4700 Series:
Table of Contents

Advertisement

4 Configure the FTP field to block or restrict various FTP traffic on the network.
Block Outbound
FTP Actions
5 Click Apply to save any changes to the Content Filtering screen. Navigating away from the screen
without clicking the Apply button results in all changes to the screens being lost.
6 Click Undo Changes (if necessary) to undo any changes made. Undo Changes reverts the settings
displayed on the Content Filtering screen to the last saved configuration.
7 Click Logout to securely exit the Access Point applet. A prompt displays confirming the logout before
the applet is closed.

Configuring Rogue AP Detection

It is possible that not all of the devices identified by the access point are operating legitimately within
the access point's radio coverage area. A rogue AP is a device located nearby an authorized Extreme
Networks access point but recognized as having properties rendering its operation illegal and
threatening to the access point and the LAN. Rogue AP detection can be configured independently for
both access point 802.11a/n and 802.11b/g/n radios (if using a dual radio sku access point). A rogue
detection interval is the user-defined interval the access point waits to search for rogue APs.
Additionally, the Access Point does not detect rogue APs on illegal channels (channels not allowed by
the regulatory requirements of the country the Access Point is operating in).
The rogue detection interval is used in conjunction with Motorola MUs that identify themselves as
rogue detection capable to the Access Point. The detection interval defines how often the Access Point
requests these MUs to scan for a rogue AP. A shorter interval can affect the performance of the MU, but
it will also decrease the time it takes for the Access Point to scan for a rogue AP. A longer interval will
have less of an impact to the MU's, but it will increase the amount of time used to detect rogue APs.
Altitude 4700 Series Access Point Product Reference Guide
File Transfer Protocol (FTP) is the Internet standard for
host-to-host mail transport. FTP generally operates over
TCP port 20 and 21. FTP filtering allows the blocking of
any or all outgoing FTP functions.
Check the box next to the command to disable the
command when using FTP across the
WAN port.
• Storing Files—Blocks the request to transfer files sent
from the client across the AP's WAN port to the FTP
server.
Retrieving Files—Blocks the request to retrieve files
sent from the FTP server across the AP's WAN port to
the client.
Directory List—Blocks requests to retrieve a directory
listing sent from the client across the AP's WAN port to
the FTP server.
Create Directory—Blocks requests to create directories
sent from the client across the AP's WAN port to the
FTP server.
Change Directory—Blocks requests to change
directories sent from the client across the AP's WAN
port to the FTP server.
Passive Operation—Blocks passive mode FTP requests
sent from the client across the AP's WAN port to the
FTP server.
access point
's
243

Advertisement

Table of Contents
loading

Table of Contents