Motorola WS5100 Series Reference Manual page 34

Hide thumbs Also See for WS5100 Series:
Table of Contents

Advertisement

1-24 WS5100 Series Switch System Reference Guide
RF scan by access port on one channel
This process requires an access port to assist in Rogue AP detection. It functions as follows:
• The switch sends a new configuration message to the adopted AP informing it to detect Rogue APs.
• The access port listens for beacons on its present channel.
• It passes the beacons to the switch as it receives them without any modification.
• The switch processes these beacon messages to generate the list of APs
This process of detecting a Rogue AP is non-disruptive and none of the MUs are disassociated during this
process. The access port will only scan on its present channel. An AP300 provides this support.
By choosing this option for detection, all capable access ports will be polled for getting the information.
RF scan by Access Port on all channels
The process used to scan for Rogue APs on all available channels functions as follows:
• The switch sends a configuration message (with the ACS bit set and channel dwell time) to the access
port.
• An access port starts scanning each channel and passes the beacons it hears on each channel to the
switch.
• An access port resets itself after scanning all channels.
• An switch then processes this information
SNMP Trap on discovery
An SNMP trap is sent for each detected and Rogue AP. Rogue APs are only detected, and notification is
provided via a SNMP trap.
NOTE: Wired side scanning for Rogue APs using WNMP is not supported. Similarly,
Radius lookup for approved AP is not provided.
Authorized AP Lists
Configure a list of authorized access ports based on their MAC addresses. The switch evaluates the APs
against the configured authorized list after obtaining Rogue AP information from one of the 2 mechanisms
as mentioned in
Rogue AP Report
After determining which are authorized APs and which are Rogue, the switch prepares a report.
Motorola RFMS Support
With this most recent switch firmware release, the switch can provide rogue device detection data to the
Motorola RF Management software application (or Motorola RFMS). Motorola RFMS uses this data to refine
the position and display the rogue on a site map representative of the physical dimensions of the actual radio
coverage area of the switch. This is of great assistance in the quick identification and removal of
unauthorized devices.
1.2.5.10 ACLs
ACLs control access to the network through a set of rules. Each rule specifies an action taken when a packet
matches a set of rules. If the action is deny, the packet is dropped. If the action is permit, the packet is
Rogue AP Detection on page
1-23.

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents