3Com 8760 User Guide - Page 229
rogue-ap authenticate
UPC - 662705506531
View all 3Com 8760 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 229 highlights
Using the Command Line Interface The rogue AP database can be viewed using the show rogue-ap command. • The access point sends Syslog messages for each detected access point during a rogue AP scan. Example Enterprise AP(if-wireless g)#rogue-ap enable configure either syslog or trap or both to receive the rogue APs detected. Enterprise AP(if-wireless g)# rogue-ap authenticate This command forces the unit to authenticate all access points on the network. Use the no form to disable this function. Syntax [no] rogue-ap authenticate Default Setting Disabled Command Mode Interface Configuration (Wireless) Command Usage Enabling authentication in conjunction with a database of approved access points stored on a RADIUS server allows the access point to discover rogue APs. With authentication enabled and a configure RADIUS server, the access point checks the MAC address/Basic Service Set Identifier (BSSID) of each access point that it finds against a RADIUS server to determine whether the access point is allowed. With authentication disabled, the access point can identify its neighboring access points only; it cannot identify whether the access points are allowed or are rogues. If you enable authentication, you should also configure a RADIUS server for this access point (see "RADIUS" on page 4-8). Example Enterprise AP(if-wireless g)#rogue-ap authenticate Enterprise AP(if-wireless g)# 5-127