Configuring the WAP200 Access Point
Configuring Security Monitor Settings
STEP 3
STEP 4
Cisco WAP200 Wireless-G Access Point with Power Over Ethernet and Rangebooster
Select the types of intrusion that will be notified in the e-mail:
•
Rogue AP Detected— A rogue access point has been detected.
•
AP SSID Changed—The Access Point (AP) SSID has been changed.
•
Spoofed MAC Address—Another device is using the AP MAC address to
send out packets.
•
Client is Sending Spurious Traffic—An unassociated client is sending out
frames to the AP.
•
Adhoc SSID same as AP—An Adhoc network uses the same SSID as the
AP.
•
Adhoc Network Operating—An STA is advertising a peer-to-peer (Adhoc)
network.
•
Rogue Client Detected—An STA is conducting an illegal transaction with
an AP.
•
Default SSID in use—Default SSID is in use on an AP.
•
Association Table Full—An AP refused a new STA association due to
resource unavailability.
•
Low Speed Connection—An STA is transmitting data at a much slower rate
set by AP.
•
New Client Detected—A new STA is associated with an AP.
•
New Access Point Detected—A new AP has been detected joining the
network.
•
Duration Attack—A STA packet contains an abnormally large duration
value in the 802. 1 1 header.
•
AP is Not Using Encryption—An AP has wireless security disabled.
•
AP Channel Changed—An AP has changed its wireless channel.
•
AP Broadcasting SSID—SSID broadcasting is left enabled on an AP.
•
Duplicate SSID in use—An unauthorized AP has the same SSID value as an
authorized AP.
Click Save.
6
58