Rogue-Ap Disable - SMC Networks SMC2890W-AN Management Manual

802.11a/b/g/n outdoor dual-band wireless access point
Hide thumbs Also See for SMC2890W-AN:
Table of Contents

Advertisement

Chapter 26
| Rogue AP Detection Commands

rogue-ap disable

rogue-ap add friendly
Command Usage
While the access point scans a channel for rogue APs, wireless clients will not be
able to connect to the access point. Therefore, avoid frequent scanning or scans
of a long duration unless there is a reason to believe that more intensive
scanning is required to find a rogue AP.
A "rogue AP" is either an access point that is not authorized to participate in the
wireless network, or an access point that does not have the correct security
configuration. Rogue access points can be identified by unknown BSSID (MAC
address). A database of nearby access points should therefore be maintained
on the AP, allowing any rogue APs to be identified (see
The rogue AP database can be viewed using the show rogue-ap command.
Example
AP(if-wireless 0)#rogue-ap enable
If want to take effect, please execute make-RF-setting-effective command !
AP(if-wireless 0)#
This command disables the periodic detection of nearby access points.
Syntax
rogue-ap disable
Default Setting
Disabled
Command Mode
Interface Configuration (Wireless)
Example
AP(if-wireless 0)#rogue-ap disable
If want to take effect, please execute make-RF-setting-effective command !
AP(if-wireless 0)#
This command adds MAC addresses of known APs in the network to a local
databaseon the AP on the network.
Syntax
rogue-ap add friendly <mac-address>
mac-address - A known AP MAC address.
Default Setting
None
– 242 –
rogue-ap add
friendly).

Advertisement

Table of Contents
loading

This manual is also suitable for:

Smc2891w-an

Table of Contents