I understand that WLSE does not accept SNMP traps that indicate an AP detected a rogue. So why is an AP that is currently designated as the WDS generating rogue AP SNMP traps?
A. The AP is generating the detected rogue trap, not the WDS functionality currently operating within the AP. This trap is based on authentication tattletale rogue detection, which is currently not reported to the WLSE. WLSE uses radio measurements to detect the rogues. The authentication tattletale method uses a message sent from a participating client that indicates some type of authentication issue with some other AP. This other AP is considered to be rogue for one of these reasons: –The rogue was not running 802.1x. –Authentication with the rogue timed out. –Bad user password. –Authentication challenge failed. This tattletale method is enabled on the AP itself, detected by the AP, and flagged at the AP via the trap.
Related Questions
- I understand that WLSE does not accept SNMP traps that indicate an AP detected a rogue. So why is an AP that is currently designated as the WDS generating rogue AP SNMP traps?
- I understand that AP on a lithograph denotes an artists proof. What do HC, EA, and BAT mean?
- I need to build an application that responds to SNMP traps. Can I use PowerTCP?