beautypg.com

5 test the setup, 1 scenario – ZyXEL Communications NWA3550 User Manual

Page 75

background image

Chapter 5 Tutorial

NWA3550 User’s Guide

75

Now you need to configure the other wireless access points on your network to do the same
things.
For each access point, take the following steps.

1 From a computer on the wired network, enter the access point’s IP address and login to

its Web configurator. See

Table 4 on page 69

for the example IP addresses.

2 Import the friendly AP list. Click ROGUE AP > Configuration > Browse.... Find the

“Flist” file where you previously saved it on the network and click Open.

3 Click Import. Check the ROGUE AP > Friendly AP screen to ensure that the friendly

AP list has been correctly uploaded.

4 Activate periodic rogue AP detection. See

Section 5.3.2 on page 73

.

5 Set up e-mail logs as in

Section 5.3.3 on page 73

, but change the Mail Subject field so

you can tell which AP the alerts come from (“ALERT_Access_Point_B”, etc.)

5.3.5 Test the Setup

Next, test your setup to ensure it is correctly configured.

• Log into each AP’s Web configurator and click ROGUE AP > Rogue AP. Click Refresh.

If any of the MAC addresses from

Table 5 on page 71

appear in the list, the friendly AP

function may be incorrectly configured - check the ROGUE AP > Friendly AP screen.
If any entries appear in the rogue AP list that are not in

Table 5 on page 71

, write down the

AP’s MAC address for future reference and check your e-mail inbox. If you have received
a rogue AP alert, email alerts are correctly configured on that ZyXEL Device.

• If you have another access point that is not used in your network, make a note of its MAC

address and set it up next to each of your ZyXEL Devices in turn while the network is
running.
Either wait for at least ten minutes (to ensure the ZyXEL Device performs a scan in that
time) or login to the ZyXEL Device’s Web configurator and click ROGUE AP > Rogue
AP
> Refresh to have the ZyXEL Device perform a scan immediately.

• Check the ROGUE AP > Rogue AP screen. You should see an entry in the list with

the same MAC address as your “rogue” AP.

• Check the LOGS > View Logs screen. You should see a Rogue AP Detection entry

in red text, including the MAC address of your “rogue” AP.

• Check your e-mail. You should have received at least one e-mail alert (your other

ZyXEL Devices may also have sent alerts, depending on their proximity and the
output power of your “rogue” AP).

5.4 Using Multiple MAC Filters and L-2 Isolation Profiles

This example shows you how to allow certain users to access only specific parts of your
network. You can do this by using multiple MAC filters and layer-2 isolation profiles.

5.4.1 Scenario

In this example, you run a company network in which certain employees must wirelessly
access secure file servers containing valuable proprietary data.