Symbol Technologies AP-5131 Network Router User Manual


 
Configuring Access Point Security
6-55
3. Use the Allowed AP List field to restrict Symbol AP’s from Rogue AP detection and create a
list of device MAC addresses and ESSID’s approved for interoperability with the AP-5131.
RF Scan by MU Select the RF Scan by MU checkbox to enable MUs to scan for
potential rogue APs within the network. Define an interval in the
Scan Interval field for associated MUs to beacon in an attempt to
locate a rogue AP. Set the interval to a value sooner than the
default if a large volume of device network traffic is anticipated
within the coverage area of the target
AP-5131 access point. The
Scan Interval field is not available unless the RF Scan by MU
checkbox is selected. Symbol clients must be associated and have
rogue AP detection enabled.
RF On-Channel
Detection
Select the RF On-Channel Detection checkbox to enable the
AP-5131 to detect rogue APs on its current (legal) channel setting.
RF Scan by Detector
Radio
If the AP-5131 supports a dual-radio SKU, select the RF Scan by
Detector Radio checkbox to enable the selected 11a or 11b/g
radio to scan for rogue APs.
Authorize Any AP
Having Symbol
Defined MAC Address
Select this checkbox to enable all access points with a Symbol
MAC address to interoperate with the
AP-5131 conducting a scan
for rogue devices.
Add Click Add to display a single set of editable MAC address and ESS
address values.
Del (Delete) Click the Delete button to remove the highlighted line from the
Rule Management field. The MAC and ESS address information
previously defined is no longer applicable unless the previous
configuration is restored.
Delete All Click the Delete All button to remove all entries from the Rule
Management field. All MAC and ESS address information
previously defined is no longer applicable unless the previous
configuration is restored.
Any MAC Select the Any MAC checkbox to prevent a device’s MAC address
(whether it is a known device MAC address or not) from being
considered a rogue device.
MAC Address Click Add, and enter the device MAC address to be excluded from
classification as a rogue device.