GWN76XX User Manual
Version 1.0.19.25
Enable Rogue AP Detection
Select to either to enable or disable Rogue AP scan.
Specify the rogue AP detect range.
ï‚· Same channel: AP will execute simple detection on the APs around,
this mode almost has no effects on the wireless network
communication.
ï‚· All channels: AP will execute a deep detection every 5 minutes. And
the clients connecting to the AP will have few seconds of
communication interrupt.
Default is Same Channel.
Countermeasures level specifies the type of attacks which will be
suspected by the AP. Select different levels:
High: Untrusted BSSID, Illegal access without authentication, Illegal
access, Spoofing SSID.
Medium: Untrusted BSSID, Illegal access without authentication, Illegal
access.
Low: Untrusted BSSID, Illegal access without authentication.
Default is Disabled.
Specify the containment range:
Same channel: detect AP will countermeasure the APs in the same
channel.
All channels: detect AP will countermeasure the APs in all channels at
the cost of consuming of much AP performance.
Default is Same Channel.
Sub-string for Spoofing SSID
The AP broadcasting SSID with the specified string will be classified as a
Spoofing SSID.
You can specify MAC address of the trusted AP, which should be
formatted as XX:XX:XX:XX:XX:XX. If an AP is defined as trusted AP, no
countermeasures will be executed on it.
You can specify MAC address of the untrusted AP, which should be
formatted as XX:XX:XX:XX:XX:XX. If an AP is defined as untrusted AP,
countermeasures will be executed on it when countermeasure is enabled.