Extreme Networks Summit WMScanner User Manual page 87

Table of Contents

Advertisement

2 To categorize the access points, select the Configure Authorized List button and select the access points
you wish to remove from the Rogue MAC address list:
3 Next, the selected access points are moved to the Unauthorized MAC Addresses list.
Summit WMScanner Users Guide
85

Advertisement

Table of Contents
loading

Table of Contents