Ap containment – Brocade Mobility RFS7000-GR Controller System Reference Guide (Supporting software release 4.1.0.0-040GR and later) User Manual

Page 330

Advertising
background image

316

Brocade Mobility RFS7000-GR Controller System Reference Guide

53-1001944-01

AP intrusion detection

6

3. The Unauthorized APs (MU Reported) table displays the following information:

4. The Number of Unauthorized APs is simply the sum of all of Unapproved Radio MAC Addresses

detected.

5. Click the Export button to export the contents of the table to a Comma Separated Values file

(CSV).

AP containment

Use the rogue AP Containment feature to provide protection from rogue Access Points by disrupting
traffic to mobile units associated with the Rogue AP and prevents new mobile units from getting
associated to the Rogue AP.

To configure Access Point Containment and view rogue APs:

BSS MAC Address

Displays the MAC Address of each Unapproved AP. These MAC addresses are
Access Points observed on the network (by associated MUs), but have yet to be
added to the list of approved APs, and are therefore interpreted as a threat on the
network.

Reporting MU

Displays the numerical value for the detecting MU.

Last Seen ( Seconds)

Displays the time (in seconds) the Unapproved AP was last seen on the network by
the detecting MU. Use this interval to determine whether the detected MU is still a
viable threat.

ESSID

Displays the ESSID of each Unapproved AP. These ESSIDs are device ESSIDs
observed on the network, but have yet to be added to the list of Approved APs and
are therefore interpreted as a threat.

Rogue - detected on
wire

Advertising