Symbol Technologies WS 2000 Switch User Manual


 
Wireless Configuration 5-27
Defining and Maintaining Approved AP List Rules
The lower half of the Rogue AP Detection screen specifies rules that determine whether a detected AP can be approved or
not. Each entry in the table works as an AP evaluation rule. You can specify a particular MAC address or a particular ESSID,
or you can indicate that any MAC address or ESSID will work. However, if you select Any MAC and Any ESSID on the same
line, all APs will be approved. Up to 20 rules can be defined.
1. Check the Approve Any AP Having a Symbol Defined MAC Address box to indicate that any Symbol AP (that is,
one that has a known Symbol MAC address) is an approved AP.
2. Click the Add button to add a line in the rule table and then fill out the following table cells:
3. To delete a particular rule from the table, select the rule and then click the Del button.
4. Click the Delete All button to clear the entire rule list.
Examine the Approve and Rogue Access Ports
This screen displays information about APs known to the switch. All approved APs are listed in the upper table. All rogue
APs are listed in the lower table. This screen also allows the administrator to create detection rules from the information
collected about approved or rogue APs.
To maintain the lists, select Network Configuration --> Wireless --> Rogue AP Detection --> AP List from the
navigation menu on the left.
Any MAC
Check this box to indicate that an AP with any MAC address matches the rule.
MAC Address
Enter an approved MAC address to be used during the detection process. This field is only used
when Any MAC (on the same line) is not checked.
Any ESSID
Check this box to indicate that an AP with any ESSID matches the rule.
ESSID
Enter an approved ESSID to be used during the detection process. This field is only used when Any
ESSID (on the same line) is not checked.