Symbol Technologies AP-5131 User Manual
Page 241

Configuring Access Point Security
6-55
3.
Use the
Allowed AP List
field to restrict Symbol AP’s from Rogue AP detection and create a
list of device MAC addresses and ESSID’s approved for interoperability with the AP-5131.
RF Scan by MU
Select the
RF Scan by MU
checkbox to enable MUs to scan for
potential rogue APs within the network. Define an interval in the
Scan Interval
field for associated MUs to beacon in an attempt to
locate a rogue AP. Set the interval to a value sooner than the
default if a large volume of device network traffic is anticipated
within the coverage area of the target
AP-5131
access point. The
Scan Interval
field is not available unless the RF Scan by MU
checkbox is selected. Symbol clients must be associated and have
rogue AP detection enabled.
RF On-Channel
Detection
Select the
RF On-Channel Detection
checkbox to enable the
AP-5131 to detect rogue APs on its current (legal) channel setting.
RF Scan by Detector
Radio
If the AP-5131 supports a dual-radio SKU, select the
RF Scan by
Detector Radio
checkbox to enable the selected
11a
or
11b/g
radio to scan for rogue APs.
Authorize Any AP
Having Symbol
Defined MAC Address
Select this checkbox to enable all access points with a Symbol
MAC address to interoperate with the
AP-5131
conducting a scan
for rogue devices.
Add
Click
Add
to display a single set of editable MAC address and ESS
address values.
Del (Delete)
Click the
Delete
button to remove the highlighted line from the
Rule Management field. The MAC and ESS address information
previously defined is no longer applicable unless the previous
configuration is restored.
Delete All
Click the
Delete All
button to remove all entries from the Rule
Management field. All MAC and ESS address information
previously defined is no longer applicable unless the previous
configuration is restored.
Any MAC
Select the
Any MAC
checkbox to prevent a device’s MAC address
(whether it is a known device MAC address or not) from being
considered a rogue device.
MAC Address
Click
Add,
and enter the device MAC address to be excluded from
classification as a rogue device.