Installation guide

Network Setup
4-108
4. Click the Edit button to display a screen to change the radio adoption default values for the selected
radio type (either 802.11a or 802.11bg).
The Properties field displays the model family for the selected access port. The model is read-only
and cannot be modified. The Radio Type displays the radio type (802.11a or 802.11bg). This value is
also read only and cannot be modified.
5. To use this radio as a detector to identify rogue APs, check the box titled Dedicate this AP as
Detector. Setting this radio as a detector dedicates this radio to detecting rogue APs on the network.
Dedicated detectors do not service clients.
6. Select the Single-channel scan for Unapproved APs checkbox to enable the switch to detect
rogue devices using the radio’s current channel.
7. Select the Enable Enhanced Beacon Table checkbox to allow associated access port or access
point radios to scan for potentially unauthorized APs across all bands.
This option utilizes allot of device radio bandwidth, but is an exhaustive means of scanning all
available channels and listening for AP beacon traffic. Once probe responses are received, a network
device management application like Motorola RFMS or the Wireless Intrusion Protection System
(WIPS) can be used to locate the device and remove it if defined as unauthorized.
8. Select the Enable Enhanced Probe Table checkbox to enable an adopted Access Port or access
point radio to forward the probes required to obtain MU RSSI information.
RSSI data (as obtained by at least three detecting radios) can be used by the Motorola RFMS
application to triangulate the location of the MU on a site map representative of the actual physical
dimensions of the switch radio coverage area. Once located on a site map, intuitive decisions can be
made regarding the MU’s authorization within the switch managed network.