A Rogue AP is an access point that has been installed on a secure network without explicit authorization from a system administrator. Rogue access points pose a security threat because anyone with access to the premises can ignorantly or maliciously install an inexpensive wireless AP that can potentially allow unauthorized parties to access the network.The Rogue AP Detection page displays information about all access points detected by the AP541N in the vicinity of the network. If the AP listed as a rogue is actually a legitimate AP, you can add it to the Known AP List. Click the Refresh button to refresh the page.
Note: The Detected Rouge AP List and Known AP List provide information. The AP541N does not have any control over the APs on the lists and cannot apply any security policies to APs detected through the RF scan.
To disable neighbor AP detection, click Disabled.To save the setting, click Apply. If the AP is in the Detected Rogue AP List, the Grant button is available. Click Grant to move the AP from the Detected Rogue AP List to the Known AP List.If the AP is in the Known AP List, the Delete button is available. Click Delete to move the AP from the Known AP List to the Detected Rogue AP List.Note: The Detected Rouge AP List and Known AP List provide information. The AP541N does not have any control over the APs on the list and cannot apply any security policies to APs detected through the RF scan. Beacon frames are transmitted by an AP at regular intervals to announce the existence of the wireless network. The default behavior is to send a beacon frame once every 100 milliseconds (or 10 per second).The Beacon Interval is set on the Wireless > Advanced Settings page.
AP indicates the detected device is an AP that supports the IEEE 802.11 Wireless Networking Framework in Infrastructure Mode.
Ad hoc designation indicates a neighboring station running in ad hoc mode. Stations set to ad hoc mode communicate with each other directly, without the use of a traditional AP. Ad-hoc mode is an IEEE 802.11 Wireless Networking Framework also referred to as peer-to-peer mode or an Independent Basic Service Set (IBSS). The Service Set Identifier (SSID) for the detected AP.The SSID is an alphanumeric string of up to 32 characters that uniquely identifies a wireless local area network. It is also referred to as the Network Name.The SSID is set on the Virtual Access Point tab.
Off indicates that the Security mode on the neighboring AP is set to None (no security).
On indicates that the neighboring AP has some security in place.Security is configured on the AP from the Virtual Access Point page. This indicates the IEEE 802.11 mode being used on the detected AP. (For example, IEEE 802.11a, IEEE 802.11b, IEEE 802.11g.)
2.4 indicates IEEE 802.11b, 802.11g, or 802.11n mode (or a combination of the modes)
5 indicates IEEE 802.11a or 802.11n mode (or both modes) The channel defines the portion of the radio spectrum that the radio uses for transmitting and receiving.The channel is set in Wireless > Advanced Settings page. Indicates the strength of the radio signal emitting from the detected AP. If you hover the mouse pointer over the bars, a number appears and shows the strength in decibels (dB). Shows supported and basic (advertised) rate sets for the detected AP. Rates are shown in megabits per second (Mbps).Rate sets are configured on the Wireless > Advanced Settings page.To save the Known AP List to a file, click Save. The list contains the MAC addresses of all APs that have been added to the Known AP List. By default, the filename is Rogue2.cfg. You can use a text editor or Web browser to open the file and view its contents.Use the Import feature to import a list of known APs from a saved list. The list might be from another Cisco AP or created from a text file. If the MAC address of an AP appears in the Known AP List, it will not be detected as a rogue.
- Select the Replace option to import the list and replace the contents of the Known AP List.
- Select the Merge option to import the list and add the APs in the imported file to the APs currently displayed in the Known AP List.
2. Click Browse and choose the file to import.The file you import must be a plain-text file with a .txt or .cfg extension. Entries in the file are MAC addresses in hexadecimal format with each octet separated by colons, for example 00:11:22:33:44:55. Separate entries with a single space. For the AP to accept the file, it must contain only MAC addresses.
3. Click Import.Once the import is complete, the screen refreshes and the MAC addresses of the APs in the imported file appear in the Known AP List.