Rogue-ap authenticate, Rogue-ap duration – SMC Networks SMC2552W-G2-17 User Manual

Page 248

Advertising
background image

Rogue AP Detection Commands

7-111

7

Example

rogue-ap authenticate

This command forces the unit to authenticate all access points on the network. Use
the no form to disable this function.

Syntax

[no] rogue-ap authenticate

Default Setting

Disabled

Command Mode

Interface Configuration (Wireless)

Command Usage

Enabling authentication in conjunction with a database of approved access
points stored on a RADIUS server allows the access point to discover rogue
APs. With authentication enabled and a configure RADIUS server, the access
point checks the MAC address/Basic Service Set Identifier (BSSID) of each
access point that it finds against a RADIUS server to determine whether the
access point is allowed. With authentication disabled, the access point can
identify its neighboring access points only; it cannot identify whether the
access points are allowed or are rogues. If you enable authentication, you
should also configure a RADIUS server for this access point (see “RADIUS”
on page 6-7)
.

Example

rogue-ap duration

This command sets the scan duration for detecting access points.

Syntax

rogue-ap duration

<milliseconds>

milliseconds

- The duration of the scan. (Range: 100-1000 milliseconds)

Enterprise AP(if-wireless g)#rogue-ap enable
configure either syslog or trap or both to receive the rogue APs
detected.
Enterprise AP(if-wireless g)#

Enterprise AP(if-wireless g)#rogue-ap authenticate
Enterprise AP(if-wireless g)#

Advertising
This manual is related to the following products: