Wireless/Redundant Edge Services xl Module Management and Configuration Guide WS.01.03 or greater
6-32
Wireless Network Management
AP Detection
■ Last Seen (In Seconds)—This column indicates how recent the information
is.
■ SSID—A radio with an unapproved MAC address, but one of your WLAN’s
SSIDs, may signal a hacker phishing for passwords and other sensitive
data.
Remember to check the Number of Unapproved APs at the bottom of the screen.
If this number nears the maximum (by default, 100), you should take one or
more of these steps:
■ Raise the number of maximum detected APs. (See “Enabling AP Detec-
tion” on page 6-19.)
■ Lower the timeout value for unseen APs. (See “Enabling AP Detection”
on page 6-19.)
■ Remove legitimate APs from the list by allowing them.
Allowing an Unapproved AP. Not all APs in the unapproved list are neces-
sarily rogue APs. Some may be RPs adopted by another module or APs that
belong to your organization; others may belong to legitimate neighboring
organizations. You can quickly move an AP to the approved list by highlighting
it and clicking the Allow button.
The Add Allowed AP screen displays. As shown in Figure 6-22, the Web
browser interface automatically fills in the AP’s MAC address and SSID.