1-24 Motorola RF Switch Systen Reference
Change Username/Password after AP Adoption
Once the AP300 is adopted using 802.1x authentication (say default username/password) OR using a non-
secure access method (hub or switch without 802.1x enabled), use the CLI/SNMP/UI to reconfigure the
username/password combination.
Reset Username/Password to Factory Defaults
To restore the AP300 username/password to factory defaults, adopt the AP300 using a non-secure access
method (a hub or switch without 802.1x enabled), then reconfigure the username/password combination.
The Access Port does not make use of any parameters (such as MAC based authentication, VLAN based etc.)
configured on Radius Server.
1.2.5.6 WIPS
The Motorola Wireless Intrusion Protection Software (WIPS) monitors for any presence of unauthorized
rogue Access Points. Unauthorized attempts to access the WLAN is generally accompanied by anomalous
behavior as intruding MUs try to find network vulnerabilities. Basic forms of this behavior can be monitored
and reported without needing a dedicated WIPS. When the parameters exceed a configurable threshold, the
switch generates an SNMP trap and reports the result via the management interfaces. Basic WIPS
functionality does not require monitoring APs and does not perform off-channel scanning.
NOTE: When converting an AP300 to an Intrusion Detection Sensor, the conversion
requires approximately 60 seconds.
NOTE: When using an AP-5131 for use with WIPS and as a sensor you must first
configure the WIPS server IP Addresses before converting the AP-5131 to a sensor.
1.2.5.7 Rogue AP Detection
The switch supports the following techniques for rogue AP detection:
•
RF scan by Access Port on all channels
•
SNMP Trap on discovery
•
Authorized AP Lists
•
Rogue AP Report
•
Motorola RFMS Support
NOTE: The Motorola RF Management Software is recommended to plan the deployment
of the switch. Motorola RFMS can help optimize the positioning and configuration of a
switch in respect to a WLAN's MU throughput requirements and can help detect rogue
devices. For more information, refer to the Motorola Web site.