EasyManua.ls Logo

Enterasys RoamAbout RBT-4102 - Using the CLI to Configure Rogue AP Detection

Enterasys RoamAbout RBT-4102
160 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Rogue AP Detection
RoamAbout RBT-4102 Wireless Access Point Configuration Guide 4-27
RADIUSAuthenticationenablestheaccesspointtodiscoverrogueaccesspoints.Enabling
RADIUSAuthenticationcausestheaccesspointtochecktheMACaddress/BasicServiceSet
Identifier(BSSID)ofeachaccesspointthatitfindsagainstaRADIUSservertodetermine
whethertheaccesspointisallowed.WithRADIUSauthenticationdisabled,
theaccesspoint
canidentifyitsneighboringaccesspointsonly;itcannotidentifywhetherthe accesspointsare
allowedorarerogues.IfyouenableRADIUSauthentication,youmustconfigureaRADIUS
serverforthisaccesspoint.
APScanIntervalspecifiesthewaittimebetweenscans.Range:30to10080
minutes.Default:
720minutesbetweenscans.
APScanDurationsetsthelengthoftimeforeachrogueAPscan.Alongscandurationtime
willdetectmoreaccesspointsinthearea,butcausesmoredisruptiontoclientaccess.Range:
100‐1000milliseconds.Default:350milliseconds.
ScanNowbuttonstarts
animmediaterogueAPscanforthespecifiedradiointerface.
ScanAllbuttonscansforall802.11aand802.11b/ginterfaces.
Using the CLI to Configure Rogue AP Detection
Usetherogueapcommand todetectneighboringaccesspointsandaccesspoints thatarenot
authorizedtoparticipateonthenetwork.Usetheinterfaceacommandtosetaccesspoint
detectionparametersfor802.11ainterfaces.Usetheinterfacegcommandtosetaccesspoint
detectionparametersfor802.11b/ginterfaces.Set
uptherogueAPfeaturebyspecifyingthescan
duration;interduration(amountoftimetomakefrequencychannelsactivetoclients);andthe
intervalbetweenscans.TouserogueAPdetection,enableradiusauthenticationusingtheradius
command.ToinitiateaRogueAPscanforallinterfaces,usethescan
command.Usetheshow
rogueapcommandfromtheExecutivemodetoviewinterfaceaandinterfacegsettingsandto
viewscanresultsforbothinterfaces.
Example
RoamAbout 4102#configure
Enter configuration commands, one per line. End with CTRL/Z
RoamAbout 4102(config)#rogue-ap radius enable
RoamAbout 4102(config)#rogue-ap interface-g enable
configure either syslog or trap or both to receive the rogue APs detected.
RoamAbout 4102(config)#rogue-ap interface-g duration 200
RoamAbout 4102(config)#rogue-ap interface-g interval 120
RoamAbout 4102(config)#rogue-ap interface-g interduration 2000
RoamAbout 4102(config)#rogue-ap interface-g scan
RoamAbout 4102(config)#exit
RoamAbout 4102#show rogue-ap
802.11a : Rogue AP Setting
========================================================================
Rogue AP Detection : Disabled
Rogue AP Authentication : Enabled
Rogue AP Scan Interval : 720 minutes
Rogue AP Scan Duration : 350 milliseconds
Rogue AP Scan InterDuration: 3000 milliseconds
Note: When the access point scans a channel for neighbor AP’s, wireless clients will not be able to
connect to the access point. Frequent scanning, or scans, of a long duration will degrade the
access points performance. Therefore, avoid frequent scanning, or scans, of long duration unless
there is a reason to believe that more intensive scanning is required to find a rogue AP.

Table of Contents

Other manuals for Enterasys RoamAbout RBT-4102

Related product manuals