Installation guide

Switch Security
6-96
The drop-down menu contains the log files listed within the Server Certificate screen.
6. Use the To drop-down menu to define whether the target log file is to be sent to the system's local
disk (Local Disk) or to an external server (Server).
7. Provide the name of the file to be transferred to the location specified within the Target field.
8. Use the Using drop down-menu to configure whether the log file transfer will be sent using FTP or
TFTP.
9. Enter the IP Address of destination server or system receiving the target log file.
10. Enter the User ID credentials required to send the file to the target location.
Use the user ID for FTP transfers only.
11. Enter the Password required to send the file to the target location using FTP.
12. Specify the appropriate Path name to the target directory on the local system disk or server as
configured using the "To" parameter.
If the local server option is selected, use the browse button to specify the location on the local server.
13. Refer to the Status field for the current state of the requests made from applet. This field displays
error messages if something goes wrong in the transaction between the applet and the switch.
14. Click the Transfer button when ready to move the target file to the specified location.
Repeat the process as necessary to move each desired log file to the specified location.
15. Click the Abort button to terminate the file transfer should you encounter a problem.
16. Click the Close button to exit the screen after a transfer. There are no changes to save or apply.
6.11 Configuring Enhanced Beacons and Probes
The switch can be configured to detect and locate rogue APs and MUs. Refer to Editing AP Settings on page
4-88 to enable an AP to forward beacons and association information for AP radios to detect a rogue. An AP
can also be configured to forward MU probe requests to the switch to help locate a rogue MU.
Use the Enhanced Beacons/Probe screen to configure enhanced beacons/probes and their reports. It consists
of the following tabs:
Configuring the Beacon Table
Configuring the Probe Table
Reviewing the Beacons Found Report
Reviewing the Probes Report
6.11.1 Configuring the Beacon Table
The Beacon Table is used to detect rogue APs. An AP300 transmits beacons and MUs send a probe request to
the AP for association. The AP300 (on receipt of the probe request) sends a probe response and forms an AP-
MU association.
NOTE Currently, only an AP300 model access port supports enhanced beacons and
probes request forward configuration.