Netgear WC7520 WC7520 Reference Manual - Page 89

Managing Rogue Access Points, Configuring Basic Rogue Detection Settings - setup

Page 89 highlights

ProSafe 20-AP Wireless Controller WC7520 Reference Manual 3. Either select the Clone an existing Profile check box or select a profile from the Profiles drop-down list. 4. Click Add, and the Edit Profile screen displays (Figure 49, Editing Basic Security Profiles on page 85). The new tab for the group you added is selected. 5. Change the settings described in Table 22, Basic Security Profile Definition on page 86. 6. Click Apply to save your settings. Managing Rogue Access Points Rogue access point detection is disabled by default on the wireless controller. If you want to detect rogue access points, you must enable rogue access point detection and specify how aggressively access points should scan for rogue access points. This affects the service availability of the access point. If rogue access point detection is set up as aggressive, the access point scans often, at which time it is unavailable for clients to associate to it. An access point is defined as rogue if: • The access point's radio BSSID is observed by any of the managed access points, • The access point is seen transmitting on the Ethernet side on the same layer 2 as the access points. • At least one client is connected to the access point. Any unmanaged access point not meeting all the conditions above is classified as a neighbor. The access points transmit broadcast frames on the Ethernet during the time access point radios are off-channel (and scanning). Note: For the triangulation of the rogue access points to work, ensure that the access points are positioned correctly in the floor plan. See Viewing and Managing Heat Maps for Deployed Plans on page 42. Configuring Basic Rogue Detection Settings In Basic Setup you can set up one server. In Advanced you can create multiple. See Configuring Advanced Rogue Detection Settings on page 90. Chapter 8: Configuring Security and Wireless Security Profiles | 89

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162

Chapter 8:
Configuring Security and Wireless Security Profiles
|
89
ProSafe 20-AP Wireless Controller WC7520 Reference Manual
3.
Either select the
Clone an existing Profile
check box or select a profile from the
Profiles
drop-down list.
4.
Click
Add
, and the Edit Profile screen displays (
Figure 49, Editing Basic Security Profiles
on
page 85). The new tab for the group you added is selected.
5.
Change the settings described in
Table 22, Basic Security Profile Definition
on page 86.
6.
Click
Apply
to save your settings.
Managing Rogue Access Points
Rogue access point detection is disabled by default on the wireless controller. If you want to
detect rogue access points, you must enable rogue access point detection and specify how
aggressively access points should scan for rogue access points. This affects the service
availability of the access point. If rogue access point detection is set up as aggressive, the
access point scans often, at which time it is unavailable for clients to associate to it.
An access point is defined as rogue if:
The access point’s radio BSSID is observed by any of the managed access points,
The access point is seen transmitting on the Ethernet side on the same layer 2 as the
access points.
At least one client is connected to the access point.
Any unmanaged access point not meeting all the conditions above is classified as a
neighbor.
The access points transmit broadcast frames on the Ethernet during the time access point
radios are off-channel (and scanning).
Note:
For the triangulation of the rogue access points to work, ensure that
the access points are positioned correctly in the floor plan. See
Viewing and Managing Heat Maps for Deployed Plans
on page 42.
Configuring Basic Rogue Detection Settings
In Basic Setup you can set up one server. In Advanced you can create multiple. See
Configuring Advanced Rogue Detection Settings
on page 90.