Motorola WS2000 System Reference Manual page 121

Wireless switch
Hide thumbs Also See for WS2000:
Table of Contents

Advertisement

To enable and configure Rogue AP Containment:
1. Check the
Enable Rogue AP Containment
2. All MUs associated to Rogue APs in the
The
Deauth Interval
example, if the time duration is 2 seconds, the switch de-authenticates MUs associated with Rogue APs
every 2 seconds. This is only available when Rogue AP Containment is enabled.
3. Check the
Deauth all APs in Rogue List
Rogue AP
list. This is only available when Rogue AP Containment is enabled.
4. The Rogue AP Containment list is a list of MAC addresses of APs that have been contained. Use the
Remove AP from Deauth List
removed, the AP can associate itself with the network and allow MUs to associate with it.
5.9.3.4 Getting Detailed Information About a Rogue AP
The Rule List screen provides a means to get detailed information about a rogue Access Port as well as its
detector to help an administrator track it down. To see detailed information:
1. Select a rogue AP from the
2. Click the
Detail
detector.
Details About the Rogue AP
The top of the Rogue AP Detail screen lists information about the rogue AP:
BSSID/MAC
This field contains the BSSID or the MAC address for the rogue AP.
ESSID
This field is the ESSID for the rogue AP.
RSSI
This field displays the Receiver Signal Strength Indicator (RSSI) for the
rogue AP. The value will be between 1 and 255. The larger the value, the
better the signal strength and the closer the AP.
Rogue AP Containment list
value sets the time duration in seconds between two such de-authentications. For
box to force de-authentication of all the APs listed in the
button to remove a selected AP from the containment list. When
Rogue AP
List.
button to open a new window to view detailed information about the rogue AP and its
box to enable this feature.
are deauthenticated by the switch.
5-37
Wireless Configuration

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents