Brocade Mobility RFS7000-GR Controller System Reference Guide (Supporting software release 4.1.0.0-040GR and later) User Manual
Page 183

Brocade Mobility RFS7000-GR Controller System Reference Guide
169
53-1001944-01
Viewing Access Port Information
4
4. Click the Edit button to display a screen containing settings for the selected radio.
5. The Switch field displays the IP address of the cluster member associated with each Access
Port radio. When clustering is enabled on the switch and Cluster GUI is enabled the Switch
field will be available on the Access Port Radio edit screen. For information on configuring
enabling Cluster GUI, see
“Managing clustering using the Web UI”
6. In the Radio Descr. field, enter a brief description to differentiate the radio. The description is
used to describe radios of the same type and can be used to locate a radio if there are any
problems.
7. Select the Dedicate this AP as Detector AP option to use this radio as a detector port to identify
rogue APs on the network.
Setting this radio as a detector dedicates the radio to detect rogue APs on the network.
Dedicated detectors do not connect to clients.
8. Select the Single-channel scan for Unapproved APs checkbox to enable the switch to scan for
rogue devices using the radio’s current channel of operation.
9. Select the Enable Enhanced Beacon Table checkbox to allow adopted Access Port or Access
Point radios to scan for potentially unauthorized APs across all bands.
This option utilizes radio bandwidth, but is an exhaustive means of scanning across all
available channels and listening for AP beacon traffic. Once probe responses are received, a
network device management application like Brocade RFMS or the Wireless Intrusion
Detection System (WIDS) can locate the device and remove it if defined as unauthorized.