Specifications
Configuring the WAP200 Access Point
Configuring Security Monitor Settings
Cisco WAP200 Wireless-G Access Point with Power Over Ethernet and Rangebooster 58
6
STEP 3 Select the types of intrusion that will be notified in the e-mail:
• Rogue AP Detected— A rogue access point has been detected.
• AP SSID Changed—The Access Point (AP) SSID has been changed.
• Spoofed MAC Address—Another device is using the AP MAC address to
send out packets.
• Client is Sending Spurious Traffic—An unassociated client is sending out
frames to the AP.
• Adhoc SSID same as AP—An Adhoc network uses the same SSID as the
AP.
• Adhoc Network Operating—An STA is advertising a peer-to-peer (Adhoc)
network.
• Rogue Client Detected—An STA is conducting an illegal transaction with
an AP.
• Default SSID in use—Default SSID is in use on an AP.
• Association Table Full—An AP refused a new STA association due to
resource unavailability.
• Low Speed Connection—An STA is transmitting data at a much slower rate
set by AP.
• New Client Detected—A new STA is associated with an AP.
• New Access Point Detected—A new AP has been detected joining the
network.
• Duration Attack—A STA packet contains an abnormally large duration
value in the 802.11 header.
• AP is Not Using Encryption—An AP has wireless security disabled.
• AP Channel Changed—An AP has changed its wireless channel.
• AP Broadcasting SSID—SSID broadcasting is left enabled on an AP.
• Duplicate SSID in use—An unauthorized AP has the same SSID value as an
authorized AP.
STEP 4 Click Save.