Chapter 3 Tutorials
NWA-3166 User’s Guide
55
3.4.5 Test the Setup
Next, test your setup to ensure it is correctly configured.
• Log into each AP’s Web configurator and click ROGUE AP > Rogue AP. Click
Refresh. If any of the MAC addresses from
Section 3.4.1 on page 49
appear in
the list, the friendly AP function may be incorrectly configured - check the
ROGUE AP > Friendly AP screen.
If any entries appear in the rogue AP list that are not in
Section 3.4.1 on page
49
, write down the AP’s MAC address for future reference and check your e-mail
inbox. If you have received a rogue AP alert, email alerts are correctly
configured on that NWA.
• If you have another access point that is not used in your network, make a note
of its MAC address and set it up next to each of your NWAs in turn while the
network is running.
Either wait for at least ten minutes (to ensure the NWA performs a scan in that
time) or login to the NWA’s Web configurator and click ROGUE AP > Rogue AP
> Refresh to have the NWA perform a scan immediately.
1
Check the ROGUE AP > Rogue AP screen. You should see an entry in the list
with the same MAC address as your “rogue” AP.
2
Check the LOGS > View Logs screen. You should see a Rogue AP Detection
entry in red text, including the MAC address of your “rogue” AP.
3
Check your e-mail. You should have received at least one e-mail alert (your other
NWAs may also have sent alerts, depending on their proximity and the output
power of your “rogue” AP).
3.5 Using MAC Filters and L-2 Isolation Profiles
This example shows you how to allow certain users to access only specific parts of
your network. You can do this by using multiple MAC filters and layer-2 isolation
profiles.
3.5.1 Scenario
In this example, you run a company network in which certain employees must
wirelessly access secure file servers containing valuable proprietary data.
You have two secure servers (1 and 2 in the following figure). Wireless user
“Alice” (A) needs to access server 1 (but should not access server 2) and wireless
user “Bob” (B) needs to access server 2 (but should not access server 1). Your
Содержание NWA-3166
Страница 2: ......
Страница 15: ...15 PART I Introduction Introduction 17 The Web Configurator 29 Tutorials 33 ...
Страница 16: ...16 ...
Страница 32: ...Chapter 2 The Web Configurator NWA 3166 User s Guide 32 ...
Страница 64: ...Chapter 3 Tutorials NWA 3166 User s Guide 64 ...
Страница 66: ...66 ...
Страница 70: ...Chapter 4 Status Screen NWA 3166 User s Guide 70 ...
Страница 122: ...Chapter 8 Wireless Screen NWA 3166 User s Guide 122 ...
Страница 128: ...Chapter 9 SSID Screen NWA 3166 User s Guide 128 ...
Страница 158: ...Chapter 14 IP Screen NWA 3166 User s Guide 158 ...
Страница 166: ...Chapter 15 Rogue AP Detection NWA 3166 User s Guide 166 ...
Страница 186: ...Chapter 17 Internal RADIUS Server NWA 3166 User s Guide 186 ...
Страница 213: ...Chapter 19 Log Screens NWA 3166 User s Guide 213 ...
Страница 214: ...Chapter 19 Log Screens NWA 3166 User s Guide 214 ...
Страница 235: ...Chapter 20 VLAN NWA 3166 User s Guide 235 ...
Страница 236: ...Chapter 20 VLAN NWA 3166 User s Guide 236 ...
Страница 270: ...Appendix B Wireless LANs NWA 3166 User s Guide 270 ...
Страница 300: ...Appendix D IP Addresses and Subnetting NWA 3166 User s Guide 300 ...
Страница 308: ...Appendix E Text File Based Auto Configuration NWA 3166 User s Guide 308 ...
Страница 314: ...Appendix F How to Access and Use the CLI NWA 3166 User s Guide 314 ...
Страница 326: ...Appendix H Customer Support NWA 3166 User s Guide 326 ...
Страница 332: ...Index NWA 3166 User s Guide 332 ...