Motorola AP-51XX User Manual
Page 281

Configuring Access Point Security
6-63
2.
Highlight an MU from within the
Rogue AP enabled MUs
field and click the scan button.
The target MU begins scanning for rogue devices using the detection parameters defined
within the Rogue AP Detection screen. To modify the detection parameters, see
Rogue AP Detection on page 6-55
Those devices detected as rogue APs display within the
Scan Result
table. Use the
displayed AP MAC, ESSID and RSSI values to determine the device listed in the table is truly
a rogue device or one inadvertently detected as a rogue AP.
3.
If necessary, highlight an individual MU from within the Scan Result field and click the
Add
to Allowed AP List
button to move the AP into the Allowed APs table within the
Active
APs
screen.
4.
Additionally, if necessary, click the
Add All to Allowed APs List
button to move every
device within the Scan Result table into the Allowed APs table within the
Active APs
screen. Only use this option if you are sure all of the devices detected and displayed within
the Scan Results table are non-hostile APs.