Configuring Enhanced Beacons And Probes; Configuring The Beacon Table - Motorola RFS7000 Series System Reference Manual

Rf switch
Hide thumbs Also See for RFS7000 Series:
Table of Contents

Advertisement

6-96
Switch Security
The drop-down menu contains the log files listed within the Server Certificate screen.
6. Use the
To
drop-down menu to define whether the target log file is to be sent to the system's local
disk (Local Disk) or to an external server (Server).
7. Provide the name of the file to be transferred to the location specified within the
8. Use the
Using
drop down-menu to configure whether the log file transfer will be sent using FTP or
TFTP.
9. Enter the
IP Address
10. Enter the
User ID
Use the user ID for FTP transfers only.
11. Enter the
Password
12. Specify the appropriate
configured using the "To" parameter.
If the local server option is selected, use the browse button to specify the location on the local server.
13. Refer to the
Status
error messages if something goes wrong in the transaction between the applet and the switch.
14. Click the
Transfer
Repeat the process as necessary to move each desired log file to the specified location.
15. Click the
Abort
button to terminate the file transfer should you encounter a problem.
16. Click the
Close
button to exit the screen after a transfer. There are no changes to save or apply.

6.11 Configuring Enhanced Beacons and Probes

The switch can be configured to detect and locate rogue APs and MUs. Refer to
4-88
to enable an AP to forward beacons and association information for AP radios to detect a rogue. An AP
can also be configured to forward MU probe requests to the switch to help locate a rogue MU.
NOTE Currently, only an AP300 model access port supports enhanced beacons and
probes request forward configuration.
Use the Enhanced Beacons/Probe screen to configure enhanced beacons/probes and their reports. It consists
of the following tabs:

Configuring the Beacon Table

Configuring the Probe Table
Reviewing the Beacons Found Report
Reviewing the Probes Report
6.11.1 Configuring the Beacon Table
The Beacon Table is used to detect rogue APs. An AP300 transmits beacons and MUs send a probe request to
the AP for association. The AP300 (on receipt of the probe request) sends a probe response and forms an AP-
MU association.
of destination server or system receiving the target log file.
credentials required to send the file to the target location.
required to send the file to the target location using FTP.
Path
name to the target directory on the local system disk or server as
field for the current state of the requests made from applet. This field displays
button when ready to move the target file to the specified location.
Target
field.
Editing AP Settings on page

Advertisement

Table of Contents
loading

Table of Contents