Monitor Tab
37
NXA-WAPZD1000 ZoneDirector Smart WLAN Controller
Rogue Devices
As contrasted with “neighboring” access points (APs) that are parts of a neighboring WLAN, “rogue”
(unauthorized) APs pose problems for a wireless network. Usually, a rogue AP appears in the following way:
an employee obtains another manufacturer's AP and connects it to the LAN, to gain wireless access to other
LAN resources. This would potentially allow even more unauthorized users to access your corporate LAN
posing a security risk. Rogue APs also interfere with nearby authorized APs, thus degrading overall wireless
network coverage.
Your NXA-WAPZD1000 rogue detection options include identifying the presence of a rogue AP, and locating
it on your worksite floorplan prior to its removal. You can also mark rogue APs as “Known” if they are located
in a neighboring network — outside your worksite — and pose no threat.
FIG. 13
Monitor Tab - Rogue Devices
Monitor Tab - Rogue Devices
Currently Active Rogue Devices:
This is the complete list of all active rogue devices currently connecting
to the network.
MAC Address:
The MAC address of the rogue device.
Channel:
The radio channel being used by the rogue device.
Radio:
The radio frequency being used by the rogue device.
Type:
The type of device being used to access the network.
Encryption:
This notes whether the connection is encrypted or open.
SSID:
The SSID of the rogue device.
Last Detected:
The last time the rogue device was detected on the network.
Action:
Click the
Mark as Known
link for the NXA-WAPZD1000 to recognise this
device as authorized.
Known/Recognized Rogue
Devices:
This is a list of all rogue devices that are recognized by the network as
being authorized or safe.
MAC Address:
The MAC address of the rogue device.
Channel:
The radio channel being used by the rogue device.
Radio:
The radio frequency being used by the rogue device.
Type:
The type of device being used to access the network.
Encryption:
This notes whether the connection is encrypted or open.
SSID:
The SSID of the rogue device.
Last Detected:
The last time the rogue device was detected on the network.
Содержание NXA-WAPZD1000
Страница 4: ......
Страница 12: ...viii NXA WAPZD1000 ZoneDirector Smart WLAN Controller Table of Contents ...
Страница 16: ...Introduction 12 NXA WAPZD1000 ZoneDirector Smart WLAN Controller ...
Страница 130: ...Blocking Client Devices 126 NXA WAPZD1000 ZoneDirector Smart WLAN Controller ...
Страница 146: ...Smart Mesh Networking Best Practices 142 NXA WAPZD1000 ZoneDirector Smart WLAN Controller ...
Страница 153: ...Troubleshooting 149 NXA WAPZD1000 ZoneDirector Smart WLAN Controller ...