Cisco Systems WAP561AK9 Network Hardware User Manual


 
Wireless
Rogue AP Detection
Cisco Small Business WAP551 and WAP561 Wireless-N Access Point 66
5
!
CAUTION After new settings are saved, the corresponding processes may be stopped and
restarted. When this happens, the WAP device may lose connectivity. We
recommend that you change WAP device settings when a loss of connectivity will
least affect your wireless clients.
Rogue AP Detection
A Rogue AP is an access point that has been installed on a secure network without
explicit authorization from a system administrator. Rogue access points pose a
security threat because anyone with access to the premises can ignorantly or
maliciously install an inexpensive wireless WAP device that can potentially allow
unauthorized parties to access the network.
The WAP device performs an RF scan on all channels on each radio to detect all
APs in the vicinity of the network. If rogue APs are detected, they are shown on the
Rogue AP Detection page. If an AP listed as a rogue is legitimate, you can add it to
the Known AP List.
NOTE The Detected Rogue AP List and Trusted AP List provide information that you can
use to take further action. The AP does not have any control over rogue APs on the
lists and cannot apply any security policies to APs detected through the RF scan.
When AP detection is enabled, the radio periodically switches from its operating
channel to scan other channels within the same band.
Rogue AP detection can be enabled and disabled. To enable the radio to collect
information about rogue APs, click Enable next to AP Detection for Radio 1 (or
Radio 2 for WAP561 devices) and then click Save.
Information about detected and trusted rogue access points appears. You can
click Refresh to refresh the screen and show the most current information:
Action—If the AP is in the Detected Rogue AP List, you can click Trust to
move the AP to the Trusted AP List.
If the AP is in the Trusted AP list, you can click Untrust to move the AP to the
Detected Rogue AP List.