User's Manual

Table Of Contents
84 Operation
Chapter 4 - System Configuration
interface (numbered 0 to 3), use the vap command. You can configure a name for
each interface using the description command. You can also use the
closed-system command to stop sending the SSID in beacon messages. Set any
other VAP parameters and radio setting as required before enabling the VAP
interface (with the no shutdown command). To view the current 802.11g radio
settings for the VAP interface, use the show interface wireless g [0-3] command
as shown on page 210.
4.4.1.2 Configuring Rogue AP Detection
To configure Rouge AP detection, select the Radio Settings page, and scroll down
to the Rouge AP section.
Rogue AP – A “rogue AP” is either an AP that is not authorized to participate in the
wireless network, or an AP that does not have the correct security configuration.
Rogue APs can allow unauthorized access to the network, or fool client stations
into mistakenly associating with them and thereby blocking access to network
resources.
The AP can be configured to periodically scan all radio channels and find other
APs within range. A database of nearby APs is maintained where any rogue APs
can be identified. During a scan, Syslog messages (see “Enabling System Logging”
Enterprise AP(if-wireless g)#vap 0 210
Enterprise AP(if-wireless g: VAP[0])#description RD-AP#3 219
Enterprise AP(if-wireless g: VAP[0])#vlan-id 1 243
Enterprise AP(if-wireless g: VAP[0])#closed-system 220
Enterprise AP(if-wireless g: VAP[0])#authentication-timeout-
interval 30
221
Enterprise AP(if-wireless g: VAP[0])#association-timeout-
interval 20
221
Enterprise AP(if-wireless g: VAP[0])#max-association 32 220
Enterprise AP(if-wireless g: VAP[0])#pmksa-lifetime 900 236
Enterprise AP(if-wireless g: VAP[0])#
Figure 4-19: Rouge AP Section of Radio Settings page