Configuring rogue ap detection, Configuring rogue ap, Detection – Brocade Mobility 5181 Access Point Product Reference Guide (Supporting software release 4.4.0.0) User Manual

Page 176

Advertising
background image

162

Brocade Mobility 5181 Access Point Product Reference Guide

53-1002516-01

Configuring rogue AP detection

6

5. Click Apply to save any changes to the Content Filtering screen. Navigating away from the

screen without clicking the Apply button results in all changes to the screens being lost.

6. Click Undo Changes (if necessary) to undo any changes made. Undo Changes reverts the

settings displayed on the Content Filtering screen to the last saved configuration.

7. Click Logout to securely exit the Access Point applet. A prompt displays confirming the logout

before the applet is closed.

Configuring rogue AP detection

It is possible that not all of the devices identified by the Mobility 5181 Access Point are operating
legitimately within the Mobility 5181 Access Point’s radio coverage area. A rogue AP is a device
located nearby an authorized Brocade Mobility 5181 Access Point but recognized as having
properties rendering its operation illegal and threatening to the Mobility 5181 Access Point and the
LAN. Rogue AP detection can be configured independently for both Mobility 5181 Access Point
802.11a and 802.11b/g radios (if using a dual radio sku Mobility 5181 Access Point). A rogue
detection interval is the user-defined interval the Mobility 5181 Access Point waits to search for
rogue APs. Additionally, the access point does not detect rogue APs on illegal channels (channels
not allowed by the regulatory requirements of the country the access point is operating in).

The rogue detection interval is used in conjunction with Brocade Clients that identify themselves as
rogue detection capable to the access point. The detection interval defines how often the access
point requests these Clients to scan for a rogue AP. A shorter interval can affect the performance of
the Client, but it will also decrease the time it takes for the access point to scan for a rogue AP. A
longer interval will have less of an impact to the Client’s, but it will increase the amount of time
used to detect rogue APs. Therefore, the interval should be set according to the perceived risk of
rogue devices and the criticality of Client performance.

Block Outbound FTP
Actions

File Transfer Protocol (FTP) is the Internet standard for host-to-host
mail transport. FTP generally operates over TCP port 20 and 21.
FTP filtering allows the blocking of any or all outgoing FTP
functions.
Check the box next to the command to disable the command when
using FTP across the

Mobility 5181 Access Point

’s WAN

port.
Storing Files - Blocks the request to transfer files sent from the
client across the AP’s WAN port to the FTP server.
Retrieving Files - Blocks the request to retrieve files sent from the
FTP server across the AP’s WAN port to the client.
Directory List - Blocks requests to retrieve a directory listing sent
from the client across the AP’s WAN port to the FTP server.
Create Directory - Blocks requests to create directories sent from
the client across the AP’s WAN port to the FTP server.
Change Directory - Blocks requests to change directories sent
from the client across the AP's WAN port to the FTP server.
Passive Operation - Blocks passive mode FTP requests sent from
the client across the AP's WAN port to the FTP server.

Advertising