Manually authorizing an msm series rogue ap, Managing rogue clients, Displaying the rogue client list – H3C Technologies H3C Intelligent Management Center User Manual

Page 434

Advertising
background image

412

Action
The Action menu provides options that you can perform on the rogue AP.

Refresh—Click the Refresh link to refresh the rogue AP information.

Forced Authorized—Click the

Forced Authorized link to manually classify the rogue AP as an

authorized AP.

Manually authorizing an MSM series rogue AP

Operator can manually classify an MSM series rogue AP as an authorized AP.
To manually authorize an MSM series rogue AP:

1.

Click the Service tab.

2.

From the navigation tree, select WLAN Manager > WIDS Management > Rogue APs.
The Rogue AP List displays all detected rogue APs.

3.

Click the Operation icon

for the target MSM series rogue AP, and then select Forced

Authorized from the shortcut menu.
A confirmation dialog box appears.

4.

Click OK.

Managing rogue clients

WSM provides a set of functions for you to manage rogue clients.

Displaying the rogue client list

All detected rogue clients are added to the rogue client list.
To display the rogue client list:

1.

Click the Service tab.

2.

From the navigation tree, select WLAN Manager > WIDS Management > Rogue Clients.
The Rogue Clients page appears, displaying all rogue clients detected.

Rogue client information includes the following fields:

MAC Address—MAC address of the rogue client. To view detailed information about the rogue
client, click the MAC address link. For field descriptions of the detailed information, see
"

Viewing detailed information about a rogue client

."

Class—Classification of the rogue client, which can be Unclassified, Rogue, External, and
Forced Authorized.

Vendor—Vendor of the rogue client's network adapter.

BSSID—MAC address of the device that is providing wireless network service for the rogue client.

Signal Strength—Signal strength of the client.

Associated Type—Association type of the client, which can be BSS, and Ad-Hoc.

Detected by—AC to which the AP that detected the rogue client belongs. To view detailed

information about the AC, click the AC link. For field descriptions of the AC's detailed
information, see "

6 Managing Comware-based access controllers

."

Advertising