User's Guide

3e-531AP Wireless Access Point
Chapter 4 Gateway Con guration
50
29000125-001 C
Rogue AP Detection
The Rogue AP Detection page allows the network administrator to
set up rogue AP detection. If you enable rogue AP detection, also enter
the MAC Address of each AP in the network that you want the AP being
con gured to accept as a trusted AP. (You may add up to 20 APs.) Enter
an email address for noti cation of any rogue or non-trusted APs.
The
Rogue AP list
, under
Monitoring Reports
on the navigation
menu, will detail any marauding APs.
802.1x
Enabling 802.1x requires that you have at least one remote Radius
server (preferably also a backup Radius server) but it will allow the use of
the legacy WEP encrypton key system with greater resultant security.
IEEE 802.1X offers an effective framework for authenticating and con-
trolling user traf c to a protected network, as well as dynamically varying
encryption keys. 802.1X ties a protocol called EAP (Extensible Authentica-
tion Protocol) to both the wired and wireless LAN media and supports
multiple authentication methods, such as token cards, Kerberos, one-time
passwords, certi cates, and public key authentication.
If using 802.1x, you must know and input the IP addess, Port Number
and Shared Secret for the primary and backup Radius server and the key
type selected on your Wireless Encryption page. Then set the accepted
lifetime for the encryption key.
This is shown on the next page.