4-16
By surveying the wireless environment of the field, it was found that an AP of another carrier exists close to the test point. The
data indicator of this AP quickly blinked, indicating that a large amount of data was transmitted. This AP was considered as the
rogue AP.
To further verify it, the AP was powered off and then packets were captured over the air interface. It was found that the Deauth
packet percentage was immediately decreased (as shown in Figure 4) from 0.239% to 0.031%.
Figure 4 Decrease of Deauth packets after the rogue AP is powered off
At this time, the users could associated normally, no packet was lost during the ping operation, and the WLAN services were
provided normally.
After the suspected rogue AP was powered on again, the issue re-occurred. Therefore, it is confirmed that this AP is the rogue
AP.
Therefore, it is confirmed that the rogue AP has enabled the AP contain function.
4.7 Typical Case
Q1: Setting the RSSI Threshold for Wireless Access Signals
The RSSI threshold of wireless access signals is set as follows:
WS6008(config-ap)#response-rssi 40
//STAs whose association signal RSSI is lower than 40 dBm are not allowed to access the wireless
network.
An STA can access the wireless network after attempting the access for more than twice.
If user access needs to be restricted forcibly, run the following command:
WS6008(config)#ac-controller