6-10 Motorola RF Switch System Reference Guide
3. To enable the AP containment feature, check the Enable Containment checkbox and specify a
Containment Interval between 20 and 5000 milliseconds.
The Containment Interval field determines the interval after which broadcast 802.11 de-authentication
messages will be sent.
4. When the containment feature has been enabled and a Containment Interval has been set, click the
Apply button to enable the feature and save the interval value.
5. The rogue AP table displays the following information about known rogue APs:
6. To manually add a rogue AP to the table, click the Add button and enter the MAC address of the known
rogue AP.
7. To remove an AP from the rogue AP table, select that AP and click the Delete button.
6.3 Wireless Intrusion Detection / Protection
Unauthorized attempts to access the switch managed LAN by MUs / APs / other Rogue devices are a
significant threat to the network, and one that is very pervasive currently. The switch has several means to
protect against threats from intruding devices, trying to find network vulnerabilities.
Use the switch’s Wireless Intrusion Detection facility to view and configure wireless intrusion related
information. The Wireless Intrusion Detection screen provides the following functionalities:
• Configuring Wireless Intrusion Detection / Protection
• Viewing Filtered MUs
6.3.1 Configuring Wireless Intrusion Detection / Protection
To configure Wireless Intrusion Detection:
1. Select Security > Wireless Intrusion Detection/ Protection from the main tree menu.
Index A unique numerical ID assigned by the switch for each of the known rogue APs.
Rogue BSS Mac Display a list of all know Rogue BSS MAC Addresses known to the switch.
Number of Finders Displays the number of detector APs that have found each of the specified Rogue
APs.
Channel Displays the channels that each of the known Rogue APs are broadcasting on.