Using mus to detect rogue devices – Brocade Mobility 7131N-FGR Access Point Product Reference Guide (Supporting software release 4.0.0.0-35GRN and later) User Manual
Page 212

200
Brocade Mobility 7131N-FGR Product Reference Guide
53-1001947-01
Configuring rogue AP detection
6
4. Refer to the Rogue Detector Detail field for the following information:
5. Click OK to securely exit the Detail screen and return to the Active APs screen.
6. Click Cancel (if necessary) to undo any changes made and return to the Active APs screen.
Using MUs to detect rogue devices
The access point can use an associated MU that has its rogue AP detection feature enabled to scan
for rogue APs. Once detected, the rogue AP(s) can be moved to the list of allowed devices (if
appropriate) within the Active APs screen. When adding an MU’s detection capabilities with the
access point’s own rogue AP detection functionality, the rogue detection area can be significantly
extended.
To use associated rogue AP enabled MUs to scan for rogue APs:
1. Select Network Configuration -> Wireless -> Rogue AP Detection -> MU Scan from the Brocade
Mobility 7131N-FGR Access Point menu tree.
The On Demand MU Scan screen displays with associated MUs with rogue AP detection
enabled
BSSID/MAC
Displays the MAC address of the rogue AP. This information could
be useful if the MAC address is determined to be a Brocade MAC
address and the device is interpreted as non-hostile and the
device should be defined as an allowed AP.
ESSID
Displays the ESSID of the rogue AP. This information could be
useful if the ESSID is determined to be non-hostile and the device
should be defined as an allowed AP.
RSSI
Shows the Relative Signal Strength (RSSI) of the rogue AP. Use this
information to assess how close the rogue AP is. The higher the
RSSI, the closer the rogue AP. If multiple access point’s have
detected the same rogue AP, RSSI can be useful in triangulating
the location of the rogue AP.
Finder’s MAC
The MAC address of the access point detecting the rogue AP.
Detection Method
Displays the RF Scan by MU, RF On-Channel Detection or RF Scan
by Detector Radio method selected from the Rogue AP screen to
detect rogue devices. For information on detection methods, see
“Configuring rogue AP detection”
First Heard
(days:hrs:min)
Defines the time in (days:hrs:min) that the rogue AP was initially
heard by the detecting AP.
Last Heard
(days:hrs:min)
Defines the time in (days:hrs:min) that the rogue AP was last heard
by the detecting AP.
Channel
Displays the channel the rogue AP is using.