17
D
ETECTING
AND
C
OMBATTING
R
OGUE
D
EVICES
This chapter discusses how to manage rogue devices that try to use your
wireless network. Information includes an overview of detection features,
enabling countermeasures, using the Rogue Detection tab, displaying a
rogue’s geographical location, ignoring friendly third-party devices, and
converting a rogue into a third party AP.
Overview
MAP radios automatically scan the RF spectrum for other devices
transmitting in the same spectrum. The RF scans discover third-party
transmitters in addition to other 3Com radios. MSS considers the
third-party transmitters to be
devices of interest
, which are potential
rogues.
You can display information about the devices of interest. To identify
friendly devices, such as non-3Com access points in your network or
neighbor’s network, you can add them to the known devices list. You also
can enable countermeasures to prevent clients from using the devices
that truly are rogues.
With 3WXM, you also can display the physical location of a rogue device.
Summary of Contents for OfficeConnect WX1200
Page 16: ......
Page 48: ...48 CHAPTER 2 WORKING WITH THE 3WXM USER INTERFACE ...
Page 236: ...236 CHAPTER 6 CONFIGURING WX SYSTEM PARAMETERS ...
Page 288: ...288 CHAPTER 7 CONFIGURING WIRELESS PARAMETERS ...
Page 332: ...332 CHAPTER 8 CONFIGURING AUTHENTICATION AUTHORIZATION AND ACCOUNTING PARAMETERS ...
Page 364: ...364 CHAPTER 10 MANAGING WX SYSTEM IMAGES AND CONFIGURATIONS ...
Page 476: ...476 CHAPTER 17 DETECTING AND COMBATTING ROGUE DEVICES ...
Page 492: ...492 CHAPTER A CHANGING 3WXM PREFERENCES ...
Page 514: ...514 APPENDIX C OBTAINING SUPPORT FOR YOUR 3COM PRODUCTS ...
Page 520: ...520 INDEX ...