Rogue AP Detection
4-26 Advanced Configuration
Rogue AP Detection
Thisfeaturescanstheairwavesandcollectsinformationaboutaccesspointsinthearea.
Theterm“rogueAP”isusedtodescribeanaccesspointthatisnotauthorizedtoparticipateonthe
network.Itmaynothavethepropersecuritysettingsinplace.RogueAP’scanpotentiallyallow
unauthorizedusers
accesstothenetwork.Inaddition,alegitimateclientmaymistakenlyassociate
toarogueAPwithinvalidencryptionsettingsandnottotheAPthathasbeenconfiguredforitto
use.Thiscancauseadenialofserviceproblem.
Itlistsaccesspointsfoundduringthescanonthe
NeighborAPDetectionStatuspageafterthe
scaniscomplete.
IfyouenabletheRADIUSauthenticationsetting,thisfeaturealsoidentifiesrogueAPs.Itperforms
aRADIUSserverlookupfortheMACaddressofeachaccesspointfound.Itreportsaccesspoints
whoseMACaddressesitfindsintheRADIUS
serveronthe NeighborAPDetectionStatuspage.It
reportsaccesspointswhoseMACaddressesitdoesnotfindasrogueAPsinthesyslog.Referto
SystemLog onpage 4‐44.RogueaccesspointscanbeidentifiedbyunknownBSSID(MAC
address)orSSIDconfiguration
Using Web Management to Configure Rogue AP Detection
SelectRogueAPDetectionfromthemenu.TheRogueAPDetectionselectionsaredisplayedin
thefollowingscreen.