Extreme Networks Altitude 4700 Series Product Reference Manual page 245

Software version 4.1
Hide thumbs Also See for Altitude 4700 Series:
Table of Contents

Advertisement

RF Scan by MU
RF On-Channel
Detection
RF Scan by
Detector Radio
RF A/BG Scan
3 Use the Allowed AP List field to restrict Extreme Networks APs from Rogue AP detection and create
a list of device MAC addresses and ESSIDs approved for interoperability with the access point.
Authorize Any AP
Having Extreme
Networks Defined
MAC Address
Add
Del (Delete)
Delete All
Any MAC
MAC Address
Any ESSID
ESSID
Altitude 4700 Series Access Point Product Reference Guide
Select the RF Scan by MU checkbox to enable MUs to
scan for potential rogue APs within the network. Define an
interval in the Scan Interval field for associated MUs to
beacon in an attempt to locate a rogue AP. Set the interval
to a value sooner than the default if a large volume of
device network traffic is anticipated within the coverage
area of the target access point. The Scan Interval field is
not available unless the RF Scan by MU checkbox is
selected. Motorola clients must be associated and have
rogue AP detection enabled.
Select the RF On-Channel Detection checkbox to enable
the Access Point to detect rogue APs on its current (legal)
channel setting.
If the Access Point is a dual-radio model, select the RF
Scan by Detector Radio checkbox to enable the selected
11a or 11b/g radio to scan for rogue APs. For example, if
11b/g is selected, the existing 11a radio would act as the
"detector radio," scanning on all 11b/g channels while the
existing 11b/g radio continues to service MUs. The
assumption is, when planning to do an all channel scan on
one band, the MUs would also be on that band. The radio
on the other band is used as the "detector radio."
Select this checkbox to scan for rouges over all channels
on both of the Access Point's 11a and 11bg radio bands.
The switching of radio bands is based on a timer with no
user intervention required. This option provides a good
opportunity to detect rogues, as rogues often roam from
one association to a stronger one regardless of the current
operating channel.
Select this checkbox to enable all Access Points with a
Extreme Networks MAC address to interoperate with the
access point conducting a scan for rogue devices.
Click Add to display a single set of editable MAC address
and ESS address values.
Click the Delete button to remove the highlighted line from
the Rule Management field. The MAC and ESS address
information previously defined is no longer applicable
unless the previous configuration is restored.
Click the Delete All button to remove all entries from the
Rule Management field. All MAC and ESS address
information previously defined is no longer applicable
unless the previous configuration is restored.
Select the Any MAC checkbox to prevent a device's MAC
address (whether it is a known device MAC address or
not) from being considered a rogue device.
Click Add, and enter the device MAC address to be
excluded from classification as a rogue device.
Select the Any ESSID checkbox to prevent a device's
ESSID (whether it is a known device ESSID or not) from
being considered a rogue device
Click Add, and enter the name of a device ESSID to be
excluded from classification as a rogue device. Do not use
< > | " & \ ? as characters for the ESSID name.
245

Advertisement

Table of Contents
loading

Table of Contents