Wireless/Redundant Edge Services xl Module Management and Configuration Guide WS.02.xx and greater

Table Of Contents
13-52
Wireless Network Management
AP Detection
Last Seen (In Seconds)This column indicates how recent the
information is.
SSIDIf a radio has an unapproved MAC address but one of your
WLAN’s SSIDs, this may signal a hacker phishing for passwords and other
sensitive data.
If this list becomes too long and unmanageable, you should take one or more
of these steps:
Lower the timeout value for unapproved APs. (See “Configuring AP
Detection” on page 13-40.)
Move legitimate APs to the approved APs list.
Allowing an Unapproved AP. Not all APs in the unapproved list are neces-
sarily rogue APs. Some may be APs adopted by another module or APs that
belong to your organization; others may belong to legitimate neighboring
organizations.
To move an AP to the approved list, complete these steps:
1. Select the AP and click the Allow button. The Add Allowed AP screen is
displayed.
As shown in Figure 13-37, the Web browser interface automatically fills
in the AP’s MAC address and SSID. It also fills in the next available index
number.
Figure 13-37.Add Allowed AP Screen