Wireless/Redundant Edge Services xl Module Management and Configuration Guide WS.02.xx and greater

Table Of Contents
13-53
Wireless Network Management
AP Detection
2. If you so desire, you can change these settings. (For example, you could
allow the MAC address, but any SSID.)
3. Click the OK button.
In a way, allowing an AP is like acknowledging an alarm. You are letting other
administrators know that you have checked the potential threat. This feature
is particularly useful for allowing APs that do not belong to your network—
so you cannot create a rule to allow them in advance—but that you have
verified as legitimate APs in a nearby organization.
Managing the Approved APs List
You should also periodically check the approved APs list to make sure that no
rogue APs have been added.
You can view this list in two ways:
Select Special Features > Access Point Detection and click the Approved APs
tab.
Select Device Information > Access Point Detection > Approved APs.
The approved APs list includes all detected APs that match the criteria for one
of the rules on the Allowed APs screen. For each AP, the list displays informa-
tion similar to that in the unapproved list, as shown in Figure 13-38.
Figure 13-38.Managing the Approved APs List