Nortel Networks 2300 Switch User Manual


 
625
Nortel WLAN—Security Switch 2300 Series Configuration Guide
Rogue detection and counter
measures
AP radios automatically scan the RF spectrum for other devices transmitting in the same spectrum. The RF scans
discover third-party transmitters in addition to other Nortel radios. WSS Software considers the non-Nortel transmitters
to be devices of interest, which are potential rogues.
You can display information about the devices of interest. To identify friendly devices, such as non-Nortel access points
in your network or neighbor’s network, you can add them to the known devices list. You also can enable countermea-
sures to prevent clients from using the devices that truly are rogues.
With WLAN Management Software, you also can display the physical location of a rogue device. (For more informa-
tion, see the Nortel WLAN Management Software 2300 Series Reference Guide.)
About rogues and RF detection
RF detection detects all the IEEE 802.11 devices in a Mobility Domain and can single out the unauthorized rogue access
points.
Rogue access points and clients
A rogue access point is an access point that is not authorized to operate in a network. Rogue access points and their
clients undermine the security of an enterprise network by potentially allowing unchallenged access to the network by
any wireless user or client in the physical vicinity. Rogue access points and users can also interfere with the operation of
your enterprise network.
About rogues and RF detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 625
Summary of rogue detection features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 630
Configuring rogue detection lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 631
Enabling countermeasures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 636
Disabling or reenabling Scheduled RF Scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . 637
Enabling AP signatures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 637
Disabling or reenabling logging of rogues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 638
Enabling rogue and countermeasures notifications . . . . . . . . . . . . . . . . . . . . . . . . . . 638
IDS and DoS alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 638
Displaying RF detection information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 643