Installation guide
Switch Security 6-9
4. The Number of Unapproved APs is simply the sum of all of Unapproved Radio MAC Addresses
detected.
5. Click the Export button to export the contents of the table to a Comma Separated Values file (CSV).
6.2.5 AP Containment
Use the rogue AP Containment feature to provide protection from rogue Access Points by disrupting traffic
to mobile units associated with the Rogue AP and prevents new mobile units from getting associated to the
Rogue AP.
To configure Access Point Containment and view rogue APs:
1. Select Security > Access Port Intrusion Detection from the main menu tree.
2. Click on the AP Containment tab.
The AP Containment screen is divided into two sections, configuration and rogue AP information.
3. To enable the AP containment feature, check the Enable Containment checkbox and specify a
Containment Interval between 20 and 5000 miliseconds.
The Containment Interval field determines the interval after which broadcast 802.11 de-authentication
messages will be sent.
4. When the containment feature has been enabled and a Containment Interval has been set, click the
Apply button to enable the feature and save the interval value.
5. The rogue AP table displays the following information about known rogue APs:
6. To manually add a rogue AP to the table, click the Add button and enter the MAC address of the known
rogue AP.
Index A unique numerical ID assigned by the switch for each of the known rogue APs.
Rogue BSS Mac Display a list of all know Rogue BSS MAC Addresses known to the switch.
Number of Finders Displays the number of detector APs that have found each specified Rogue AP.
Channel Displays the channels that each of the known Rogue APs are broadcasting on.