User's Manual

Table Of Contents
Configuring the Wireless Network (Cisco RV180W)
Configuring Rogue Access Point Detection
Cisco RV180/RV180W Administration Guide 69
3
DRAFT - CISCO CONFIDENTIAL
environment. This function boosts the Cisco RV180W’s ability to catch all wireless
transmissions but severely decreases performance.
STEP 8 The Short Retry Limit and Long Retry Limit fields determine the number of times
the Cisco RV180/RV180W will reattempt a frame transmission that fails. The limit
applies to both long and short frames of a size less than or equal to the RTS
threshold.
STEP 9 Click Save.
Configuring Rogue Access Point Detection
You can configure the Cisco RV180W to detect rogue access points, or
unauthorized access points that have been connected to your wireless network.
Enabling Rogue AP Detection
To configure rogue AP detection:
STEP 1 Choose Wireless > Rogue AP.
STEP 2 Under Rogue AP Detection, check Enable.
STEP 3 Click Save.
Authorizing a Rogue AP
Authorizing a Rogue AP
If an AP has been marked as a rogue AP, and you want to authorize it to connect to
the network, you can authorize it from the Rogue AP Detected Table. To authorize
an endpoint:
STEP 1 Choose Wireless > Rogue AP.
STEP 2 In the Rogue AP Detected Table, check the box corresponding to the AP, then click
Authorize. Authorized APs are displayed in the