Rogue Ap Detection - Cisco WAP121 Administration Manual

Wireless-n access point with poe wireless-n selectable-band access point with poe
Hide thumbs Also See for WAP121:
Table of Contents

Advertisement

Wireless Settings

Rogue AP Detection

Rogue AP Detection
NOTE
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
A Rogue AP is an access point that has been installed on a secure network without
explicit authorization from a system administrator. Rogue access points pose a
security threat because anyone with access to the premises can ignorantly or
maliciously install an inexpensive wireless WAP device that can potentially allow
unauthorized parties to access the network.
The Rogue AP Detection page provides real-time statistics for all APs detected
by the WAP device in the vicinity of the network. If the AP listed as a rogue is
legitimate, you can add it to the Known AP List.
The Detected Rogue AP List and Trusted AP List provide information that you can
use to take further action. The AP does not have any control over rogue APs on the
lists and cannot apply any security policies to APs detected through the RF scan.
To view information about other access points on the wireless network, click
Status and Statistics > Rogue AP Detection in the navigation window.
When AP detection is enabled, the radio will periodically switch from its operating
channel to scan other channels within the same band.
Rogue AP detection can be enabled and disabled. To enable the radio to collect
information about rogue APs, click Enable next to AP Detection. You can click
Refresh to refresh the screen and display the most current information.
Information about detected and trusted rogue access points displays:
Action—If the AP is in the Detected Rogue AP List, you can click Trust to
move the AP from the to the Trusted AP List.
If the AP is in the Trusted AP list, you can click Untrust to move the AP to the
Detected Rogue AP List.
The Detected Rogue AP List and Trusted AP List provide information.
NOTE
The WAP121/WAP321 does not have any control over the APs on the list and
cannot apply any security policies to APs detected through the RF scan.
MAC Address—The MAC address of the rogue AP.
Beacon Interval—The Beacon interval used by the rogue AP.
Beacon frames are transmitted by an AP at regular intervals to announce
the existence of the wireless network. The default behavior is to send a
beacon frame once every 100 milliseconds (or 10 per second).
The Beacon Interval is set on the Wireless > Radio page.
NOTE
5
67

Advertisement

Table of Contents
loading

This manual is also suitable for:

Wap321

Table of Contents