Netgear WAC730-Business User Manual - Page 55
Monitor Rogue APs, Con the WiFi Features and Security
View all Netgear WAC730-Business manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 55 highlights
Dual-Band Wireless AC Access Point WAC720 and WAC730 User Manual 7. To move APs from the Unknown AP List to the Known AP List, do the following: a. Select individual check boxes for MAC addresses, or select all MAC addresses by selecting the check box in the heading. b. Click the Move button to transfer the MAC addresses from the Unknown AP List to the Known AP List. 8. To import a list of known APs, do the following: a. Click the Replace or Merge button. The imported list either replaces the Known AP List or merges with the Known AP List. b. Click the Choose File button and navigate to and select the file with access points. The file that you import must be a plain-text file with a .txt or .cfg extension. Entries in the file must be MAC addresses in hexadecimal format with each octet separated by colons, for example 00:11:22:33:44:55. Separate entries with a single space. For the file to be accepted, it must contain only MAC addresses. 9. To fine-tune the Known AP List and delete one or more MAC address from the Known AP List, select individual check boxes for the MAC addresses and click the Delete button. 10. Click the Apply button. Your settings are saved. Monitor Rogue APs You can view a table with rogue access points that were detected.The table also provides detailed information about the rogue access points. To monitor rogue APs: 1. Open a web browser from a computer that is connected to the same network as the access point or to the access point directly through an Ethernet cable. For more information, see Log In to the Access Point on page 16. 2. In the address bar, enter the IP address of the access point. A login window opens. 3. Enter the user name and password. The user name is admin. The default password is password. The user name and password are case-sensitive. Configure the WiFi Features and Security 55