EasyManuals Logo

Enterasys RoamAbout RBT-4102 User Manual

Enterasys RoamAbout RBT-4102
160 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #63 background imageLoading...
Page #63 background image
Rogue AP Detection
RoamAbout RBT-4102 Wireless Access Point Configuration Guide 4-27
RADIUSAuthenticationenablestheaccesspointtodiscoverrogueaccesspoints.Enabling
RADIUSAuthenticationcausestheaccesspointtochecktheMACaddress/BasicServiceSet
Identifier(BSSID)ofeachaccesspointthatitfindsagainstaRADIUSservertodetermine
whethertheaccesspointisallowed.WithRADIUSauthenticationdisabled,
theaccesspoint
canidentifyitsneighboringaccesspointsonly;itcannotidentifywhetherthe accesspointsare
allowedorarerogues.IfyouenableRADIUSauthentication,youmustconfigureaRADIUS
serverforthisaccesspoint.
APScanIntervalspecifiesthewaittimebetweenscans.Range:30to10080
minutes.Default:
720minutesbetweenscans.
APScanDurationsetsthelengthoftimeforeachrogueAPscan.Alongscandurationtime
willdetectmoreaccesspointsinthearea,butcausesmoredisruptiontoclientaccess.Range:
100‐1000milliseconds.Default:350milliseconds.
ScanNowbuttonstarts
animmediaterogueAPscanforthespecifiedradiointerface.
ScanAllbuttonscansforall802.11aand802.11b/ginterfaces.
Using the CLI to Configure Rogue AP Detection
Usetherogueapcommand todetectneighboringaccesspointsandaccesspoints thatarenot
authorizedtoparticipateonthenetwork.Usetheinterfaceacommandtosetaccesspoint
detectionparametersfor802.11ainterfaces.Usetheinterfacegcommandtosetaccesspoint
detectionparametersfor802.11b/ginterfaces.Set
uptherogueAPfeaturebyspecifyingthescan
duration;interduration(amountoftimetomakefrequencychannelsactivetoclients);andthe
intervalbetweenscans.TouserogueAPdetection,enableradiusauthenticationusingtheradius
command.ToinitiateaRogueAPscanforallinterfaces,usethescan
command.Usetheshow
rogueapcommandfromtheExecutivemodetoviewinterfaceaandinterfacegsettingsandto
viewscanresultsforbothinterfaces.
Example
RoamAbout 4102#configure
Enter configuration commands, one per line. End with CTRL/Z
RoamAbout 4102(config)#rogue-ap radius enable
RoamAbout 4102(config)#rogue-ap interface-g enable
configure either syslog or trap or both to receive the rogue APs detected.
RoamAbout 4102(config)#rogue-ap interface-g duration 200
RoamAbout 4102(config)#rogue-ap interface-g interval 120
RoamAbout 4102(config)#rogue-ap interface-g interduration 2000
RoamAbout 4102(config)#rogue-ap interface-g scan
RoamAbout 4102(config)#exit
RoamAbout 4102#show rogue-ap
802.11a : Rogue AP Setting
========================================================================
Rogue AP Detection : Disabled
Rogue AP Authentication : Enabled
Rogue AP Scan Interval : 720 minutes
Rogue AP Scan Duration : 350 milliseconds
Rogue AP Scan InterDuration: 3000 milliseconds
Note: When the access point scans a channel for neighbor AP’s, wireless clients will not be able to
connect to the access point. Frequent scanning, or scans, of a long duration will degrade the
access points performance. Therefore, avoid frequent scanning, or scans, of long duration unless
there is a reason to believe that more intensive scanning is required to find a rogue AP.

Table of Contents

Other manuals for Enterasys RoamAbout RBT-4102

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Enterasys RoamAbout RBT-4102 and is the answer not in the manual?

Enterasys RoamAbout RBT-4102 Specifications

General IconGeneral
BrandEnterasys
ModelRoamAbout RBT-4102
CategoryWireless Access Point
LanguageEnglish

Related product manuals