Symbol Technologies AP-5131 User Manual

Page 247

Advertising
background image

Configuring Access Point Security

6-61

2.

Highlight an MU from within the

Rogue AP enabled MUs

field and click the scan button.

The target MU begins scanning for rogue devices using the detection parameters defined
within the Rogue AP Detection screen. To modify the detection parameters, see

Configuring Rogue AP Detection on page 6-53

.

Those devices detected as rogue APs display within the

Scan Result

table. Use the

displayed AP MAC, ESSID and RSSI values to determine the device listed in the table is truly
a rogue device or one inadvertently detected as a rogue AP.

3.

If necessary, highlight an individual MU from within the Scan Result field and click the

Add

to Allowed AP List

button to move the AP into the Allowed APs table within the

Active

APs

screen.

4.

Additionally, if necessary, click the

Add All to Allowed APs List

button to move every

device within the Scan Result table into the Allowed APs table within the

Active APs

screen. Only use this option if you are sure all of the devices detected and displayed within
the Scan Results table are non-hostile APs.

5.

Highlight a different MU from the Rogue AP enabled MUs field as needed to scan for
additional rogue APs.

Advertising