Brocade Communications Systems Mobility 7131 Series Service Manual Page 252

  • Download
  • Add to my manuals
  • Print
  • Page
    / 520
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 251
240 Brocade Mobility 7131 Access Point Product Reference Guide
53-1002517-01
6
2. Highlight an MU from within the Rogue AP enabled MUs field and click the scan button.
The target MU begins scanning for rogue devices using the detection parameters defined
within the Rogue AP Detection screen. To modify the detection parameters, see
Configuring Rogue AP Detection on page 6-234.
Those devices detected as rogue APs display within the Scan Result table. Use the
displayed AP MAC, ESSID and RSSI values to determine the device listed in the table is
truly a rogue device or one inadvertently detected as a rogue AP.
3. If necessary, highlight an individual MU from within the Scan Result field and click the Add to
Allowed AP List button to move the AP into the Allowed APs table within the Active APs screen.
4. Additionally, if necessary, click the Add All to Allowed APs List button to move every device
within the Scan Result table into the Allowed APs table within the Active APs screen. Only use
this option if you are sure all of the devices detected and displayed within the Scan Results
table are non-hostile APs.
5. Highlight a different MU from the Rogue AP enabled MUs field as needed to scan for additional
rogue APs.
6. Click Logout to return to the Rogue AP Detection screen.
Configuring User Authentication
The access point can work with external Radius and LDAP Servers (AAA Servers) to provide user
database information and user authentication.
Page view 251
1 2 ... 247 248 249 250 251 252 253 254 255 256 257 ... 519 520

Comments to this Manuals

No comments