Motorola WS2000 System Reference Manual page 120

Wireless switch
Hide thumbs Also See for WS2000:
Table of Contents

Advertisement

5-36 WS2000 Wireless Switch System Reference Guide
First Seen
Last Seen
Reporting AP
1. Enter a number in the
before an AP will be removed from the rogue list and reevaluated. A zero (0) in this field indicates that
an AP can stay on the list permanently.
2. Click the
Add to Approved AP Rule List
table of the Rogue AP Detection screen. The generated rule will use the MAC address and ESSID of the
selected AP.
3. Click the
Add All to Approved AP Rule List
Management table on the Rogue AP Detection screen for all the APs on the list. The generated rules will
use the MAC addresses and ESSIDs of the APs.
4. Click the
Add to Containment List
containment list is a list of APs that will not be allowed to join the network. MUs associated with APs in
the containment list are de-authenticated every time interval defined in the
5.9.3.3 Rogue AP Containment
Rogue AP Containment feature enables you to prevent rogue APs and their associated MUs from joining your
network. This feature is disabled by default.
NOTE: Rogue AP Containment should only be used to contain those APs that adversely impact the network
and its devices.
This field indicates the number of elapsed hours since the rogue AP was first noticed on the
network in hours:minutes:seconds.
This field indicates the number of elapsed hours since the rogue AP was last noticed on the
network in hours:minutes:seconds.
This field shows the MAC address of the device that detected the rogue AP.
Rogue Entries Age Out Time
button to add a selected Rogue AP to a containment list. The
field to indicate the number of elapsed minutes
button to add a rule to the Approved APs' Rule Management
button to add a rule to the Approved APs' Rule
Deauth Interval
field.

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents