Specifications

Wireless Configuration 5-37
Details About the Rogue Detector
The lower portion of the Rogue AP Detail screen displays information about the AP that detected the rogue.
This information if provided to the administrator to help located the rogue.
NOTE: The WS2000 Wireless Switch only reports rogue APs. It is up to the administrator to change
security settings or disrupt the rogue AP’s connection.
5.9.4 Setting SNMP Traps for Rogue APs
It is also possible to set a trap for a rogue AP.
1. Go to [System Configuration] --> SNMP Access --> SNMP Traps from the navigation menu.
Finder's MAC This is the MAC address for the AP that detected the rogue AP.
Closest AP MAC This is the MAC address for the AP that is physically closest to the rogue AP.
Closest AP Name This is the name of the AP that is physically closest to the rogue AP.
Scan Method This is the scan method that was used to detect the rogue AP. The possible values are:
MU (detected by a mobile unit)
Detector (detected by the Detector AP)
On Channel (detected by non-detector AP)
First Seen This is the number of hours:minutes:seconds since the rogue AP was first noticed on the
network.
Last Seen This is the number of hours:minutes:seconds since the rogue AP was last noticed on the
network.