Netgear WAC730-Business User Manual - Page 55

Monitor Rogue APs, Con the WiFi Features and Security

Page 55 highlights

Dual-Band Wireless AC Access Point WAC720 and WAC730 User Manual 7. To move APs from the Unknown AP List to the Known AP List, do the following: a. Select individual check boxes for MAC addresses, or select all MAC addresses by selecting the check box in the heading. b. Click the Move button to transfer the MAC addresses from the Unknown AP List to the Known AP List. 8. To import a list of known APs, do the following: a. Click the Replace or Merge button. The imported list either replaces the Known AP List or merges with the Known AP List. b. Click the Choose File button and navigate to and select the file with access points. The file that you import must be a plain-text file with a .txt or .cfg extension. Entries in the file must be MAC addresses in hexadecimal format with each octet separated by colons, for example 00:11:22:33:44:55. Separate entries with a single space. For the file to be accepted, it must contain only MAC addresses. 9. To fine-tune the Known AP List and delete one or more MAC address from the Known AP List, select individual check boxes for the MAC addresses and click the Delete button. 10. Click the Apply button. Your settings are saved. Monitor Rogue APs You can view a table with rogue access points that were detected.The table also provides detailed information about the rogue access points. To monitor rogue APs: 1. Open a web browser from a computer that is connected to the same network as the access point or to the access point directly through an Ethernet cable. For more information, see Log In to the Access Point on page 16. 2. In the address bar, enter the IP address of the access point. A login window opens. 3. Enter the user name and password. The user name is admin. The default password is password. The user name and password are case-sensitive. Configure the WiFi Features and Security 55

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163

7.
To move APs from the Unknown AP List to the Known AP List, do the following:
a.
Select individual check boxes for MAC addresses, or select all MAC addresses by selecting the
check box in the heading.
b.
Click the
Move
button to transfer the MAC addresses from the Unknown AP List to the Known AP
List.
8.
To import a list of known APs, do the following:
a.
Click the
Replace
or
Merge
button.
The imported list either replaces the Known AP List or merges with the Known AP List.
b.
Click the
Choose File
button and navigate to and select the file with access points.
The file that you import must be a plain-text file with a .txt or .cfg extension. Entries in the file must be
MAC addresses in hexadecimal format with each octet separated by colons, for example
00:11:22:33:44:55. Separate entries with a single space. For the file to be accepted, it must contain only
MAC addresses.
9.
To fine-tune the Known AP List and delete one or more MAC address from the Known AP List, select
individual check boxes for the MAC addresses and click the
Delete
button.
10.
Click the
Apply
button.
Your settings are saved.
Monitor Rogue APs
You can view a table with rogue access points that were detected.The table also provides detailed information
about the rogue access points.
To monitor rogue APs:
1.
Open a web browser from a computer that is connected to the same network as the access point or to
the access point directly through an Ethernet cable.
For more information, see
Log In to the Access Point
on page 16.
2.
In the address bar, enter the IP address of the access point.
A login window opens.
3.
Enter the user name and password.
The user name is
admin
. The default password is
password
. The user name and password are
case-sensitive.
Configure the WiFi Features and Security
55
Dual-Band Wireless AC Access Point WAC720 and WAC730 User Manual