Wlan security configuration example, Rogue detection configuration example, Network requirements – H3C Technologies H3C WX6000 Series Access Controllers User Manual

Page 503: Configuration procedure, Rogue detection configuration example -15, Table 42-10

Advertising
background image

42-15

Table 42-10 White list configuration items

Item

Description

MAC Address

Add a MAC address to the white list.

Select Current Connect
Client

If you select the check box, the table below lists the current existing clients. Select
the check boxes of the clients to add their MAC addresses to the white list.

WLAN Security Configuration Example

Rogue Detection Configuration Example

Network requirements

As shown in

Figure 42-21

, a monitor AP (AP 2 with serial ID 210235A29G007C000020) and AP 1 (serial

ID 210235A29G007C000022) are connected to an AC through a Layer 2 switch.

AP 1 operates in normal mode and provides WLAN data services only.

AP 2 operates in monitor mode, and scans all 802.11g frames in the WLAN.

Client 1 (MAC address 000f-e215-1515), Client 2 (MAC address 000f-e215-1530), and Client 3

(MAC address 000f-e213-1235) are connected to AP 1. They are configured as friends.

Client 4 (MAC address 000f-e220-405e) is connected to AP 2. It is configured as a rogue device.

Figure 42-21 WLAN security configuration

Configuration procedure

1) Configure AP 1 to operate in normal mode

In normal mode, AP 1 provides WLAN data services only. For how to configure WLAN services, refer to

Wireless Service Configuration.

2) Configure AP 2 to operate in monitor mode

# Add an AP.

Select AP > AP Setup in the navigation tree to enter the configuration page. Click Add to enter the AP

setup page as shown in

Figure 42-22

.

Advertising