5 test the setup, 1 scenario – ZyXEL Communications NWA3550 User Manual
Page 75

Chapter 5 Tutorial
NWA3550 User’s Guide
75
Now you need to configure the other wireless access points on your network to do the same
things.
For each access point, take the following steps.
1 From a computer on the wired network, enter the access point’s IP address and login to
its Web configurator. See
for the example IP addresses.
2 Import the friendly AP list. Click ROGUE AP > Configuration > Browse.... Find the
“Flist” file where you previously saved it on the network and click Open.
3 Click Import. Check the ROGUE AP > Friendly AP screen to ensure that the friendly
AP list has been correctly uploaded.
4 Activate periodic rogue AP detection. See
.
5 Set up e-mail logs as in
, but change the Mail Subject field so
you can tell which AP the alerts come from (“ALERT_Access_Point_B”, etc.)
5.3.5 Test the Setup
Next, test your setup to ensure it is correctly configured.
• Log into each AP’s Web configurator and click ROGUE AP > Rogue AP. Click Refresh.
If any of the MAC addresses from
appear in the list, the friendly AP
function may be incorrectly configured - check the ROGUE AP > Friendly AP screen.
If any entries appear in the rogue AP list that are not in
AP’s MAC address for future reference and check your e-mail inbox. If you have received
a rogue AP alert, email alerts are correctly configured on that ZyXEL Device.
• If you have another access point that is not used in your network, make a note of its MAC
address and set it up next to each of your ZyXEL Devices in turn while the network is
running.
Either wait for at least ten minutes (to ensure the ZyXEL Device performs a scan in that
time) or login to the ZyXEL Device’s Web configurator and click ROGUE AP > Rogue
AP > Refresh to have the ZyXEL Device perform a scan immediately.
• Check the ROGUE AP > Rogue AP screen. You should see an entry in the list with
the same MAC address as your “rogue” AP.
• Check the LOGS > View Logs screen. You should see a Rogue AP Detection entry
in red text, including the MAC address of your “rogue” AP.
• Check your e-mail. You should have received at least one e-mail alert (your other
ZyXEL Devices may also have sent alerts, depending on their proximity and the
output power of your “rogue” AP).
5.4 Using Multiple MAC Filters and L-2 Isolation Profiles
This example shows you how to allow certain users to access only specific parts of your
network. You can do this by using multiple MAC filters and layer-2 isolation profiles.
5.4.1 Scenario
In this example, you run a company network in which certain employees must wirelessly
access secure file servers containing valuable proprietary data.