LogoLogo
  • EWS Series User Manual
  • Product Overview
    • Introduction
    • LED Behavior
    • Comparison Table
    • Technical Specification
  • Getting Started
    • Management Interface
    • Connecting the Switch
  • Wireless Controller Features
    • Managing EnSky Access Points
    • Device Management
      • Access Points
      • Access Point Settings
      • AP Groups
      • Wireless Services
    • Monitor
      • Active Clients
      • Rogue AP Detection
      • System Log
      • Email Alert
    • Visualization
      • Topology View
      • Map View
      • Floor View
      • Mesh View
    • Statistics
      • Access Points
      • Wireless Clients
      • Real-Time Throughput
    • Hotspot Services
      • Captive Portal
      • Guest Account
    • Mesh
      • Mesh Profile
      • Node List
      • Mesh Tools
      • Isolated Nodes
    • Maintenance
      • Schedule Tasks
      • Troubleshooting
      • Bulk Upgrade
      • One-click Update
      • SSL Certificate
      • Check Codes
  • Ethernet Switch Features
    • System
      • Summary
      • Network Settings
      • System Time
      • Port Settings
      • PoE
      • EEE
    • L2 Features
      • Link Aggregtion
      • STP
      • MAC Address Table
      • LLDP
      • IGMP Snooping
      • MLD Snooping
      • Jumbo Frame
    • VLAN
      • 802.1Q
      • PVID
      • Voice VLAN
    • Management
      • System Information
      • User Management
      • Dual Image
      • SNMP
    • ACL
      • MAC ACL
      • MAC ACE
      • IPv4 ACL
      • IPv4 ACE
      • IPv6 ACL
      • IPv6 ACE
      • ACL Binding
    • QoS
      • Global Settings
      • CoS Mapping
      • DSCP Mapping
      • Port Settings
      • Bandwidth Control
      • Storm Control
    • Security
      • 802.1x
      • Radius Server
      • Access
      • Port Security
      • Port Isolation
      • DoS
    • Monitoring
      • Port Statistics
      • RMON
      • Log
    • Diagnostics
      • Cable Diagnostics
      • Ping Test
      • IPv6 Ping Test
      • Trace Route
    • Maintenance
      • Configuration Manager
      • Firmware Upgrade
  • Appendix
    • Appendix A
    • Appendix B
    • Appendix C
Powered by GitBook
On this page

Was this helpful?

Export as PDF
  1. Wireless Controller Features
  2. Monitor

Rogue AP Detection

PreviousActive ClientsNextSystem Log

Last updated 4 years ago

Was this helpful?

Rogue access points mostly refer to those unauthorized and unmanaged APs attached to existing or nearby networks which could bring harm to the deployed WLAN or gain access to confidential business information. With Background Scanning enabled, the rogue AP detection feature can be used to periodically scan 2.4 GHz and 5 GHz frequency bands to identify rogue wireless access points not managed by the EWS switch.

Search Bar

Use the Search Bar to search for specific rogue access points detected using the following criteria: BSSID, SSID, Type, Channel, Mode, Band, Security, and Detector.

Column Filter

Shows or hides fields in the list.