User's Manual
Chapter 15 Rogue AP Detection
NWA-3500/NWA-3550 User’s Guide
190
This scenario can also be part of a wireless denial of service (DoS) attack, in which
associated wireless clients are deprived of network access. Other opportunities for
the attacker include the introduction of malware (malicious software) into the
network.
15.2 Configuration Screen
Use this screen to enable your NWA’s Rogue AP detection settings. Click Rogue
AP > Configuration. The following screen appears:
Figure 108 Rogue AP Configuration
The following table describes the labels in this screen.
Table 51 Rogue AP Configuration
LABEL DESCRIPTION
Rogue AP Period
Detection
Select Enable to turn rogue AP detection on. You must also enter
a time value in the Period field.
Select No to turn rogue AP detection off.
Period (minutes) Enter the period you want the NWA to wait between scanning for
rogue APs (between 10 and 60 minutes). You must also select
Enable in the Active Rogue AP Period Detection field.
Expiration Time
(minutes)
Specify how long (between 30 and 180 minutes) an AP’s entry can
remain in the Rogue AP List before the NWA removes it from the
list if the AP is no longer active.
Friendly AP List
Export Click this button to save the current list of friendly APs’ MAC
addresses and descriptions (as displayed in the ROGUE AP >
Friendly AP screen) to your computer.
File Path Enter the location of a previously-saved friendly AP list to upload
to the NWA. Alternatively, click the Browse button to locate a list.
Browse Click this button to locate a previously-saved list of friendly APs to
upload to the NWA.










