WESM xl Management and Configuration Guide WS.02.XX and greater
13-52
Wireless Network Management
AP Detection
■ Last Seen (In Seconds)—This column indicates how recent the
information is.
■ SSID—If a radio has an unapproved MAC address but one of your
WLAN’s SSIDs, this may signal a hacker phishing for passwords and other
sensitive data.
If this list becomes too long and unmanageable, you should take one or more
of these steps:
■ Lower the timeout value for unapproved APs. (See “Configuring AP
Detection” on page 13-40.)
■ Move legitimate APs to the approved APs list.
Allowing an Unapproved AP. Not all APs in the unapproved list are neces-
sarily rogue APs. Some may be APs adopted by another module or APs that
belong to your organization; others may belong to legitimate neighboring
organizations.
To move an AP to the approved list, complete these steps:
1. Select the AP and click the Allow button. The Add Allowed AP screen is
displayed.
As shown in Figure 13-37, the Web browser interface automatically fills
in the AP’s MAC address and SSID. It also fills in the next available index
number.
Figure 13-37.Add Allowed AP Screen