Netgear WAC720 Reference Manual - Page 45

Enable Rogue AP Detection, Configuration > Security > Advanced > Rogue AP

Page 45 highlights

ProSAFE Dual-Band Wireless AC Access Point WAC720 WAC730 The wireless access point places the MAC addresses of the attached wireless stations in this table. 5. Populate the Trusted Wireless Stations table by one of the following methods: • Select MAC addresses from the Available Wireless Stations table: a. Select individual check boxes for MAC addresses, or select all MAC addresses by selecting the check box in the heading. b. Click the Move button to transfer the MAC addresses from the Available Wireless Stations table to the Trusted Wireless Stations table. • Enter MAC addresses manually: a. Enter a MAC address directly in the Trusted Wireless Stations table. b. Click the Add button. To delete a MAC address from the Trusted Wireless Stations table, select individual check boxes for MAC addresses, or select all MAC addresses by selecting the check box in the heading, and then click the Delete button. 6. Click the Apply button. Your settings are saved. Now, only devices in the Trusted Wireless Stations table are allowed to connect to the wireless access point over a wireless connection. WARNING: When configuring the wireless access point from a wireless computer whose MAC address is not on the access control list, you lose your wireless connection when you click the Apply button. You then must access the wireless access point from a wired computer or from a wireless computer that is on the access control list to make any further changes. Enable Rogue AP Detection Unidentified access points that use the SSID of a legitimate network can present a serious security threat. Detecting rogue access points involves scanning the wireless environment on all available channels, looking for unidentified access points. When Rouge AP Detection is enabled, the access point will only interact with devices in the Known AP list.  To enable Rouge AP detection: 1. Select Configuration > Security > Advanced > Rogue AP. Wireless Configuration and Security 45

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113

Wireless Configuration and Security
45
ProSAFE Dual-Band Wireless AC Access Point WAC720 WAC730
The wireless access point places the MAC addresses of the attached wireless stations in
this table.
5.
Populate the Trusted Wireless Stations table by one of the following methods:
Select MAC addresses from the Available Wireless Stations table:
a.
Select individual check boxes for MAC addresses, or select all MAC addresses by
selecting the check box in the heading.
b.
Click the
Move
button to transfer the MAC addresses from the Available Wireless
Stations table to the Trusted Wireless Stations table.
Enter MAC addresses manually:
a.
Enter a MAC address directly in the Trusted Wireless Stations table.
b.
Click the
Add
button.
To delete a MAC address from the Trusted Wireless Stations table, select individual check
boxes for MAC addresses, or select all MAC addresses by selecting the check box in the
heading, and then click the
Delete
button.
6.
Click the
Apply
button.
Your settings are saved.
Now, only devices in the Trusted Wireless Stations table are allowed to connect to the
wireless access point over a wireless connection.
WARNING:
When configuring the wireless access point from a wireless
computer whose MAC address is not on the access control list, you
lose your wireless connection when you click the Apply button. You
then must access the wireless access point from a wired computer
or from a wireless computer that is on the access control list to
make any further changes.
Enable Rogue AP Detection
Unidentified access points that use the SSID of a legitimate network can present a serious
security threat. Detecting rogue access points involves scanning the wireless environment on
all available channels, looking for unidentified access points.
When Rouge AP Detection is enabled, the access point will only interact with devices in the
Known AP list.
To enable Rouge AP detection:
1.
Select
Configuration > Security > Advanced > Rogue AP
.