Wireless/Redundant Edge Services xl Module Management and Configuration Guide WS.02.xx and greater

Table Of Contents
13-39
Wireless Network Management
AP Detection
AP Detection
People may introduce unauthorized APs into your network for several
reasons.
Sometimes attackers set up rogue APs in your environment, hoping to lure
wireless users to authenticate to them instead of to your network’s RPs. In
this way, attackers can collect sensitive information, including passwords
with which they can then access your private network and view, steal, or
damage data.
More commonly, users introduce APs for their own convenience, not meaning
any particular harm. However, because users often take inadequate measures
to secure these APs, the unauthorized APs open vulnerabilities for hackers to
exploit.
The ProCurve RPs 210, 220, and 230 can listen for such unauthorized APs,
collecting information about them to be sent to the Wireless Edge Services xl
Module.
The module helps you to manage this information. You can even configure the
module to automatically send an alarm when an unauthorized AP is detected.
Note AP detection tracks devices that are not connected, either directly or indi-
rectly, to the Wireless Edge Services xl Module. It does not prevent unautho-
rized RPs from being adopted. To control RPs that connect to your network,
you must configure the module’s adoption settings as described in Chapter 2:
Configuring the ProCurve Wireless Edge Services xl Module.
You can enable and manage AP detection from the Special Features > Access
Point Detection screen, which is shown in Figure 13-26.