ZyXEL Communications NWA-3500 ユーザーズマニュアル

ページ / 396
Chapter 15 Rogue AP Detection
NWA-3500/NWA-3550 User’s Guide
180
(the dashed ellipse B) is well-secured, but the rogue AP uses inferior security that 
is easily broken by an attacker (X) running readily available encryption-cracking 
software. In this example, the attacker now has access to the company network, 
including sensitive data stored on the file server (C).
15.2  What You Can Do in the Rogue AP Screen
• Use  the  Rogue AP > Configuration screen (see 
to enable your NWA’s Rogue AP detection settings. You can choose to scan for 
rogue APs manually, or to have the NWA scan automatically at pre-defined 
intervals.
• Use  the    Rogue AP > Friendly AP screen (see 
) t
specify APs as trusted. 
• Use  the  Rogue AP > Rogue AP screen (see 
) to 
display details of all IEEE 802.11a/b/g wireless access points within the NWA’s 
coverage area, except for the NWA itself and the access points included in the 
friendly AP list.
15.3  What You Need To Know
You can configure the NWA to detect rogue IEEE 802.11a (5 GHz) and IEEE 
802.11b/g (2.4 GHz) APs. 
You can also set the NWA to e-mail you immediately when a rogue AP is detected 
(see 
 for information on how to set up e-mail logs).
You can set how often you want the NWA to scan for rogue APs in the Rogue AP 
Configuration screen (see 
).
Friendly APs
If you have more than one AP in your wireless network, you must also configure 
the list of “friendly” APs. Friendly APs are other wireless access points, aside from 
the NWA, that are detected in your network, as well as any others that you know 
are not a threat (those from neighboring networks, for example). It is 
recommended that you export (save) your list of friendly APs often, especially if 
you have a network with a large number of access points. If you do not add them 
to the friendly AP list, these access points will appear in the Rogue AP list each 
time the NWA scans.
The friendly AP list displays details of all the access points in your area that you 
know are not a threat. If you have more than one AP in your network, you need to 
configure this list to include your other APs. If your wireless network overlaps with