Chapter 15 Rogue AP Detection
NWA-3500/NWA-3550 User’s Guide
188
In the example above, a corporate network’s security is compromised by a rogue
AP (
R
) set up by an employee at his workstation in order to allow him to connect
his notebook computer wirelessly (
A
). The company’s legitimate wireless network
(the dashed ellipse
B
) is well-secured, but the rogue AP uses inferior security that
is easily broken by an attacker (
X
) running readily available encryption-cracking
software. In this example, the attacker now has access to the company network,
including sensitive data stored on the file server (
C
).
15.1.1 What You Can Do in the Rogue AP Screen
• Use the
Rogue AP
>
Configuration
screen (see
enable your NWA’s Rogue AP detection settings. You can choose to scan for
rogue APs manually, or to have the NWA scan automatically at pre-defined
intervals.
• Use the
Rogue AP
>
Friendly AP
screen (see
) to
specify APs as trusted.
• Use the
Rogue AP
>
Rogue AP
screen (see
) to
display details of all IEEE 802.11a/b/g/n wireless access points within the NWA’s
coverage area, except for the NWA itself and the access points included in the
friendly AP list.
15.1.2 What You Need To Know About Rogue AP
The following terms and concepts may help as you read through this chapter.
You can configure the NWA to detect rogue IEEE 802.11a/n (5 GHz) and IEEE
802.11b/g (2.4 GHz) APs.
You can also set the NWA to e-mail you immediately when a rogue AP is detected
(see
for information on how to set up e-mail logs).
You can set how often you want the NWA to scan for rogue APs in the
ROGUE AP
>
Configuration
Friendly APs
If you have more than one AP in your wireless network, you can configure a list of
“friendly” APs. Friendly APs are other wireless access points, aside from the NWA,
that are detected in your network, as well as any others that you know are not a
threat (those from neighboring networks, for example). It is recommended that
you export (save) your list of friendly APs often, especially if you have a network
with a large number of access points. If you do not add them to the friendly AP
list, these access points will appear in the
Rogue AP
list each time the NWA
scans.
Содержание NWA-3550
Страница 2: ......
Страница 8: ...Safety Warnings NWA 3500 NWA 3550 User s Guide 8...
Страница 10: ...Contents Overview NWA 3500 NWA 3550 User s Guide 10...
Страница 20: ...Table of Contents NWA 3500 NWA 3550 User s Guide 20...
Страница 22: ...22...
Страница 40: ...Chapter 2 The Web Configurator NWA 3500 NWA 3550 User s Guide 40...
Страница 80: ...Chapter 3 Tutorial NWA 3500 NWA 3550 User s Guide 80...
Страница 82: ...82...
Страница 92: ...Chapter 5 Management Mode NWA 3500 NWA 3550 User s Guide 92...
Страница 108: ...Chapter 6 AP Controller Mode NWA 3500 NWA 3550 User s Guide 108...
Страница 144: ...Chapter 8 Wireless Configuration NWA 3500 NWA 3550 User s Guide 144...
Страница 168: ...Chapter 10 Wireless Security Screen NWA 3500 NWA 3550 User s Guide 168...
Страница 182: ...Chapter 13 MAC Filter Screen NWA 3500 NWA 3550 User s Guide 182...
Страница 186: ...Chapter 14 IP Screen NWA 3500 NWA 3550 User s Guide 186...
Страница 194: ...Chapter 15 Rogue AP Detection NWA 3500 NWA 3550 User s Guide 194...
Страница 216: ...Chapter 17 Internal RADIUS Server NWA 3500 NWA 3550 User s Guide 216...
Страница 244: ...Chapter 19 Log Screens NWA 3500 NWA 3550 User s Guide 244...
Страница 270: ...Chapter 21 Load Balancing NWA 3160 Series User s Guide 270...
Страница 274: ...Chapter 22 Dynamic Channel Selection NWA 3160 Series User s Guide 274...
Страница 286: ...Chapter 23 Maintenance NWA 3500 NWA 3550 User s Guide 286...
Страница 287: ...287 PART III Troubleshooting and Specifications Troubleshooting 289 Product Specifications 297...
Страница 288: ...288...
Страница 296: ...Chapter 24 Troubleshooting NWA 3500 NWA 3550 User s Guide 296...
Страница 304: ...304...
Страница 398: ...Appendix F Text File Based Auto Configuration NWA 3500 NWA 3550 User s Guide 398...
Страница 408: ...Index NWA 3500 NWA 3550 User s Guide 408...