Specifications
Configuring Access Point Security
Altitude 3500 Series Access Point Product Reference Guide
212
3 Use the Allowed AP List field to restrict Extreme Networks APs from Rogue AP detection and create 
a list of device MAC addresses and ESSIDs approved for interoperability with the Altitude 35xx.
RF Scan by MU Select the RF Scan by MU checkbox to enable MUs to 
scan for potential rogue APs within the network. Define an 
interval in the Scan Interval field for associated MUs to 
beacon in an attempt to locate a rogue AP. Set the interval 
to a value sooner than the default if a large volume of 
device network traffic is anticipated within the coverage 
area of the target Altitude 35xx. The Scan Interval field is 
not available unless the RF Scan by MU checkbox is 
selected. Motorola clients must be associated and have 
rogue AP detection enabled. 
RF On-Channel 
Detection
Select the RF On-Channel Detection checkbox to enable 
the access point to detect rogue APs on its current (legal) 
channel setting.
RF Scan by 
Detector Radio
If the access point is a dual-radio model, select the RF 
Scan by Detector Radio checkbox to enable the selected 
11a or 11b/g radio to scan for rogue APs. For example, if 
11b/g is selected, the existing 11a radio would act as the 
“detector radio,” scanning on all 11b/g channels while the 
existing 11b/g radio continues to service MUs. The 
assumption is, when planning to do an all channel scan on 
one band, the MUs would also be on that band. The radio 
on the other band is used as the “detector radio.”
RF A/BG Scan Select this checkbox to scan for rouges over all channels 
on both of the access point’s 11a and 11bg radio bands. 
The switching of radio bands is based on a timer with no 
user intervention required. This option provides a good 
opportunity to detect rogues, as rogues often roam from 
one association to a stronger one regardless of the current 
operating channel.
Authorize Any AP 
Having Extreme 
Networks Defined 
MAC Address
Select this checkbox to enable all access points with an 
Extreme Networks MAC address to interoperate with the 
Altitude 35xx conducting a scan for rogue devices.
Add Click Add to display a single set of editable MAC address 
and ESS address values. 
Del (Delete) Click the Delete button to remove the highlighted line from 
the Rule Management field. The MAC and ESS address 
information previously defined is no longer applicable 
unless the previous configuration is restored.
Delete All Click the Delete All button to remove all entries from the 
Rule Management field. All MAC and ESS address 
information previously defined is no longer applicable 
unless the previous configuration is restored.
Any MAC Select the Any MAC checkbox to prevent a device’s MAC 
address (whether it is a known device MAC address or 
not) from being considered a rogue device.
MAC Address Click Add, and enter the device MAC address to be 
excluded from classification as a rogue device.
Any ESSID Select the Any ESSID checkbox to prevent a device’s 
ESSID (whether it is a known device ESSID or not) from 
being considered a rogue device
ESSID Click Add, and enter the name of a device ESSID to be 
excluded from classification as a rogue device.










