Switch Security 6-9
3. The Unauthorized APs (MU Reported) table displays the following information:
4. The Number of Unauthorized APs is simply the sum of all of Unapproved Radio MAC Addresses
detected.
5. Click the Export button to export the contents of the table to a Comma Separated Values file (CSV).
6.2.5 AP Containment
Use the rogue AP Containment feature to provide protection from rogue Access Points by disrupting traffic
to mobile units associated with the Rogue AP and prevents new mobile units from getting associated to the
Rogue AP.
To configure Access Point Containment and view rogue APs:
1. Select Security > Access Port Intrusion Detection from the main menu tree.
2. Click on the AP Containment tab.
The AP Containment screen is divided into two sections, configuration and rogue AP information.
BSS MAC Address Displays the MAC Address of each Unapproved AP. These MAC addresses are
Access Points observed on the network (by associated MUs), but have yet to be
added to the list of approved APs, and are therefore interpreted as a threat on the
network.
Reporting MU Displays the numerical value for the detecting MU.
Last Seen (In
Seconds)
Displays the time (in seconds) the Unapproved AP was last seen on the network
by the detecting MU. Use this interval to determine whether the detected MU is
still a viable threat.
ESSID Displays the ESSID of each Unapproved AP. These ESSIDs are device ESSIDs
observed on the network, but have yet to be added to the list of Approved APs and
are therefore interpreted as a threat.