Wireless
Rogue AP Detection
Cisco Small Business WAP371 Wireless Access Point Administration Guide
66
5
If the AP is in the Trusted AP list, you can click Untrust to move the AP to the
Detected Rogue AP List.
NOTE
The Detected Rogue AP List and Trusted AP List provide information. The AP
does not have any control over the APs on the list and cannot apply any security policies
to APs detected through the RF scan.
•
MAC Address—The MAC address of the rogue AP.
•
Radio—Indicates whether the rogue AP is detected on Radio 1 (wlan0) or Radio 2
(wlan1).
•
Beacon Interval—The beacon interval used by the rogue AP.
Beacon frames are transmitted by an AP at regular intervals to announce the existence
of the wireless network. The default behavior is to send a beacon frame once every 100
milliseconds (or 10 per second).
NOTE
The Beacon Interval is set on the
Radio
page.
•
Type—The type of device:
-
AP indicates the rogue device is an AP that supports the IEEE 802.11 Wireless
Networking Framework in Infrastructure Mode.
-
Ad hoc indicates a rogue station running in Ad hoc mode. Stations set to Ad hoc
mode communicate with each other directly, without the use of a traditional AP. Ad
hoc mode is an IEEE 802.11 Wireless Networking Framework also referred to as
peer-to-peer mode or an Independent Basic Service Set (IBSS).
•
SSID—The Service Set Identifier (SSID) for the WAP device.
The SSID is an alphanumeric string of up to 32 characters that uniquely identifies a
wireless local area network. It is also referred to as the Network Name.
•
Privacy—Indicates whether there is any security on the rogue device:
-
Off indicates that the Security mode on the rogue device is set to None (no
security).
-
On indicates that the rogue device has some security in place.
NOTE
You can use the
Networks
page to configure security on the AP.
•
WPA—Whether WPA security is on or off for the rogue AP.
•
Band—The IEEE 802.11 mode being used on the rogue AP. (For example, IEEE
802.11a, IEEE 802.11b, IEEE 802.11g.)
The number shown indicates the mode: