WESM zl Management and Configuration Guide WT.01.28 and greater
12-54
Wireless Network Management
AP Detection
3. Click the OK button.
In a way, allowing an AP is like acknowledging an alarm. You are letting other
administrators know that you have checked the potential threat. This feature is
particularly useful for allowing APs that do not belong to your network—so you
cannot create a rule to allow them in advance—but that you have verified as legitimate
APs in a nearby organization.
Managing the Approved APs List
You should also periodically check the approved APs list to make sure that no rogue
APs have been added.
You can view this list in two ways:
■ Select Special Features > Access Point Detection and click the Approved APs
tab.
■ Select Device Information > Access Point Detection > Approved APs.
The approved APs list includes all detected APs that match the criteria for one of the
rules on the Allowed APs screen. For each AP, the list displays information similar
to that in the unapproved list, as shown in Figure 12-38.
Figure 12-38.Managing the Approved APs List
If a rogue AP is on this list, you should reconfigure the rule that allowed it. For
example, to screen APs you may need to use MAC addresses instead of, or in addition
to, SSIDs.