Configuring user authentication, Configuring user, Authentication – Brocade Mobility 7131N-FGR Access Point Product Reference Guide (Supporting software release 4.0.0.0-35GRN and later) User Manual

Page 213

Advertising
background image

Brocade Mobility 7131N-FGR Product Reference Guide

201

53-1001947-01

Configuring user authentication

6

2. Highlight an MU from within the Rogue AP enabled MUs field and click the scan button.

The target MU begins scanning for rogue devices using the detection parameters defined
within the Rogue AP Detection screen. To modify the detection parameters, see

“Configuring

rogue AP detection”

on page 195.

Those devices detected as rogue APs display within the Scan Result table. Use the displayed
AP MAC, ESSID and RSSI values to determine the device listed in the table is truly a rogue
device or one inadvertently detected as a rogue AP.

3. If necessary, highlight an individual MU from within the Scan Result field and click the Add to

Allowed AP List button to move the AP into the Allowed APs table within the Active APs screen.

4. Additionally, if necessary, click the Add All to Allowed APs List button to move every device

within the Scan Result table into the Allowed APs table within the Active APs screen. Only use
this option if you are sure all of the devices detected and displayed within the Scan Results
table are non-hostile APs.

5. Highlight a different MU from the Rogue AP enabled MUs field as needed to scan for additional

rogue APs.

6. Click Logout to return to the Rogue AP Detection screen.

Configuring user authentication

The access point can work with external Radius and LDAP Servers (AAA Servers) to provide user
database information and user authentication.

Advertising