Cisco Cisco WAP571 Wireless-AC N Premium Dual Radio Access Point with PoE 관리 매뉴얼

다운로드
페이지 192
Wireless
Rogue AP Detection
Cisco WAP571/E Administration Guide
80
5
STEP  6
Click Save. The changes are saved to the Startup Configuration.
!
CAUTION
After new settings are saved, the corresponding processes may be stopped and 
restarted. When this happens, the WAP device may lose connectivity. We 
recommend that you change WAP device settings when a loss of connectivity will 
least affect your wireless clients. 
Rogue AP Detection
A Rogue AP is an access point that has been installed on a secure network without 
explicit authorization from a system administrator. Rogue access points pose a 
security threat because anyone with access to the premises can ignorantly or 
maliciously install an inexpensive wireless AP that can potentially allow 
unauthorized parties to access the network.
The AP performs an RF scan on all channels on each radio to detect all APs in the 
vicinity of the network. If rogue APs are detected, they are shown on the Rogue AP 
Detection page. If an AP listed as a rogue is legitimate, you can add it to the Known 
AP List.
NOTE
The Detected Rogue AP List and Trusted AP List provide information that you can 
use to take further action. The AP does not have any control over rogue APs on the 
lists and cannot apply any security policies to APs detected through the RF scan. 
To view more information about rogue APs, select Wireless > Rogue AP Detection 
in the main navigation pane.
When AP detection is enabled, the radio periodically switches from its operating 
channel to scan other channels within the same band.
Viewing the Rogue AP List
Rogue AP detection can be enabled and disabled. To enable the radio to collect 
information about rogue APs, click Enable next to AP Detection for Radio 1 or 
Radio 2 and then click Save.
Rogue AP detection does not have a refresh method and the SSID are retained in 
the database once detected.