Symbol Technologies WS 2000 Switch User Manual


 
WS 2000 Wireless Switch System Reference Guide5-28
The Approved AP List
Each row of this table represents an approved AP that the switch has found. For each AP, both the MAC and the ESSID for
the AP are listed. Use this portion of the screen to change the age out time or to add a rule to the rule list for a particular AP:
1. Enter a number in the Approved AP 's Age Out Time field to indicate the number of elapsed minutes before an AP
will be removed from the approved list and reevaluated. A zero (0) in this field indicates that an AP can stay on the list
permanently.
2. Click the Add to Rule List button to add a rule to the Approved APs' Rule Management table on the Rogue AP Detection
screen. The generated rule will use the MAC address and ESSID of the selected AP.
3. Click the Add All to Rule List button to add a rule to the Approved APs' Rule Management table on the Rogue AP
Detection screen for all the APs on the list. The generated rules will use the MAC addresses and ESSIDs of the APs.
The Rogue AP List
Each row of this table represents a rogue AP that the switch has found. For each AP, both the MAC and the ESSID for the
AP is listed as well as some information about when the AP was first and last seen:
AP MAC
This field is the MAC address for the rogue AP.
ESSID
This field is the ESSID for the rogue AP.
First Seen
This field indicates the number of elapsed hours since the rogue AP was first noticed on the network
in hours:minutes:seconds.
Last Seen
This field indicates the number of elapsed hours since the rogue AP was last noticed on the network
in hours:minutes:seconds.
Reporting AP
This field shows the MAC address of the device that detected the rogue AP.