Symbol Technologies AP-5131 User Manual

Page 241

Advertising
background image

Configuring Access Point Security

6-55

3.

Use the

Allowed AP List

field to restrict Symbol AP’s from Rogue AP detection and create a

list of device MAC addresses and ESSID’s approved for interoperability with the AP-5131.

RF Scan by MU

Select the

RF Scan by MU

checkbox to enable MUs to scan for

potential rogue APs within the network. Define an interval in the

Scan Interval

field for associated MUs to beacon in an attempt to

locate a rogue AP. Set the interval to a value sooner than the
default if a large volume of device network traffic is anticipated
within the coverage area of the target

AP-5131

access point. The

Scan Interval

field is not available unless the RF Scan by MU

checkbox is selected. Symbol clients must be associated and have
rogue AP detection enabled.

RF On-Channel
Detection

Select the

RF On-Channel Detection

checkbox to enable the

AP-5131 to detect rogue APs on its current (legal) channel setting.

RF Scan by Detector
Radio

If the AP-5131 supports a dual-radio SKU, select the

RF Scan by

Detector Radio

checkbox to enable the selected

11a

or

11b/g

radio to scan for rogue APs.

Authorize Any AP
Having Symbol
Defined MAC Address

Select this checkbox to enable all access points with a Symbol
MAC address to interoperate with the

AP-5131

conducting a scan

for rogue devices.

Add

Click

Add

to display a single set of editable MAC address and ESS

address values.

Del (Delete)

Click the

Delete

button to remove the highlighted line from the

Rule Management field. The MAC and ESS address information
previously defined is no longer applicable unless the previous
configuration is restored.

Delete All

Click the

Delete All

button to remove all entries from the Rule

Management field. All MAC and ESS address information
previously defined is no longer applicable unless the previous
configuration is restored.

Any MAC

Select the

Any MAC

checkbox to prevent a device’s MAC address

(whether it is a known device MAC address or not) from being
considered a rogue device.

MAC Address

Click

Add,

and enter the device MAC address to be excluded from

classification as a rogue device.

Advertising