User's Manual
Table Of Contents
- WavePoint™ Product Safety
- Preface
- Chapter 1: Introduction
- Key Features and Supported Protocols
- Requirements
- Accessories
- Product Variations
- WavePoint 10e Labels
- WavePoint™ Components
- Certified Antennas
- Connect Power
- Network Deployment Scenarios
- Connecting and Logging In
- Configuration Pages
- Chapter 2: Configuring Basic WavePoint™ Network Features
- Chapter 3: Additional Data Networking Features
- Chapter 4: Configuring Wireless Access
- Example: Point-to-Point Configuration
- Point-to-Multipoint Configuration Examples
- Configuring Wireless Communication
- Defining Advanced Radio Settings
- Verify the Wireless Connection
- Enabling Virtual Access Points
- Wireless Security
- Scheduling When Wireless Connections are Available
- Chapter 5: Security
- Chapter 6: Management and Administration
- Set Up Remote Access to the WAN Port
- User Access Management
- Software Maintenance
- System Logging
- Simple Network Management Protocol (SNMP)
- Authentication Certificates
- Setting the Date and Time
- System Statistics
- Chapter 7: Diagnostics and Troubleshooting
- Appendix A: Factory Default Settings
- Chapter B: Installation Instructions
- Appendix C: WavePoint™ Configurations
- Appendix D: Bench Test Verification of WavePoint™ Configuration
- Appendix E: WavePoint 10e Technical Specifications
- Glossary
- Index
Chapter 4: Configuring Wireless Access
5. In the MAC Address field, enter the MAC address of the device to grant network access
to.
Note: MAC addresses are typically printed on a device's physical label.
6. Click Save to save the changes or Cancel to clear any changes without saving.
Delete a Device from the List
l Right-click an address in the table and click Delete.
l Right-click anywhere in the table and click Select All > Delete.
Enabling Rogue Access Point Detection
A rogue access point is any device that accesses the network without authorization. Rogue access
points often do not meet the wireless LAN security policies and can allow anyone with a wireless-
enabled device to connect to the network.
Enabling rogue detection identifies unauthorized wireless devices and prevents them from
accessing the wireless network. WavePoint 10e collects a list of unauthorized devices that
attempted to access the network for review.
Procedure
1. Connect to the WavePoint 10e either through an Ethernet cable connected to Ethernet
port 3 or 4 or through the computer's wireless options.
2. Use a web browser to access the Configuration pages.
3. On the Wireless LAN menu, click Rogue AP List.
4. In the Radio field, select the radio to enable rogue detection on.
Radios are labeled 1, 2, 3, and 4.
The label on the back panel of each WavePoint 10e identifies what type of radio is
installed and which number corresponds to each installed radio.
5. Set the Enable Rogue AP Detection option to On to enable rogue detection for the
selected radio.
6. Click Save to save the changes or Cancel to clear any changes without saving.
Review Devices that Attempted to Access the Network
1. Connect to the WavePoint 10e either through an Ethernet cable connected to Ethernet
port 3 or 4 or through the computer's wireless options.
Page 94 of 171 LUM0063AA Rev 05/05/2014
This document is the property of FreeWave Technologies, Inc. and contains proprietary information owned by
FreeWave®. This document cannot be reproduced in whole or in part by any means without written permission from
FreeWave Technologies, Inc.