
Summit WMScanner Quick Start Guide - Page 13 of 17
Step 8: After the list has been populated, you now have the option to specify which APs are authorized,
unauthorized, or rogues. Authorized APs are APs that are part of your network. Unauthorized APs are APs
that you are aware of but are not part of your network (i.e. APs that are part of a neighboring office
network). APs classified as rogues are those APs that do not belong in the environment and should not be
present. Now click on the Configure Authorized List
Configure Authorized List
Configure Authorized List
Configure Authorized List button. In the Configure Authorized List
Configure Authorized List
Configure Authorized List
Configure Authorized List dialog
window, you will see that all the MAC addresses for visible APs will initially be under the Rogue MAC
Rogue MAC
Rogue MAC
Rogue MAC
Address
Address
Address
Address section. Select the authorized MAC addresses that are part of your network and click the ‘<<<’
button to populate them under the Authorized
Authorized
Authorized
Authorized MAC Addresses
MAC Addresses
MAC Addresses
MAC Addresses. Repeat this for the unauthorized MAC
addresses and then click OK
OK
OK
OK. Users can also load a text file list of authorized MAC addresses into Summit
WMScanner. The text file needs to have one MAC address per line with the following format for the
address: “XX:XX:XX:XX:XX:XX”.