5-127
Using the Command Line Interface
The rogue AP database can be viewed using the
show rogue-ap
command.
• The access point sends Syslog messages for each detected access point
during a rogue AP scan.
Example
rogue-ap authenticate
This command forces the unit to authenticate all access points on the network.
Use the
no
form to disable this function.
Syntax
[
no
]
rogue-ap authenticate
Default Setting
Disabled
Command Mode
Interface Configuration (Wireless)
Command Usage
Enabling authentication in conjunction with a database of approved access
points stored on a RADIUS server allows the access point to discover rogue
APs. With authentication enabled and a configure RADIUS server, the access
point checks the MAC address/Basic Service Set Identifier (BSSID) of each
access point that it finds against a RADIUS server to determine whether the
access point is allowed. With authentication disabled, the access point can
identify its neighboring access points only; it cannot identify whether the
access points are allowed or are rogues. If you enable authentication, you
should also configure a RADIUS server for this access point (see “RADIUS”
on page 4-8).
Example
Enterprise AP(if-wireless g)#rogue-ap enable
configure either syslog or trap or both to receive the rogue APs detected.
Enterprise AP(if-wireless g)#
Enterprise AP(if-wireless g)#rogue-ap authenticate
Enterprise AP(if-wireless g)#
Summary of Contents for 3CRWE876075 / WL-546
Page 6: ...6...
Page 14: ...1 6 CHAPTER 1 INTRODUCTION...
Page 40: ...3 12 CHAPTER 3 INITIAL CONFIGURATION...
Page 68: ...4 28 CHAPTER 4 SYSTEM CONFIGURATION Figure 32 WDS and Spanning Tree Settings...
Page 254: ...5 152 CHAPTER 5 COMMAND LINE INTERFACE...
Page 258: ...6 4 CHAPTER 6 TROUBLESHOOTING...