SonicOS 7.0 Objects
- SonicOS 7.0
- Match Objects
- Zones
- How Zones Work
- Default Zones
- Security Types
- Allow Interface Trust
- Effect of Wireless Controller Modes
- Zones Overview
- The Zones Page
- Adding a New Zone
- Adding a New Zone in Policy Mode
- Adding a New Zone in Classic Mode
- Configuring a Zone for Guest Access
- Configuring a Zone for Open Authentication and Social Login
- Configuring the WLAN Zone
- Configuring the RADIUS Server
- Configuring DPI-SSL Granular Control per Zone
- Enabling Automatic Redirection to the User-Policy Page
- Cloning a Zone
- Editing a Zone
- Deleting Custom Zones
- Addresses
- Addresses Page
- About UUIDs for Address Objects and Groups
- Working with Dynamic Address Objects
- Services
- URI Lists
- Schedules
- Dynamic Group
- Email Addresses
- Match Objects
- Countries
- Applications
- Web Categories
- Websites
- Match Patterns
- Custom Match
- Profile Objects
- Endpoint Security
- Bandwidth
- QoS Marking
- Content Filter
- DHCP Option
- Block Page
- Anti-Spyware
- Gateway Anti-Virus
- Log and Alerts
- Intrusion Prevention
- AWS
- Action Profiles
- Security Action Profile
- DoS Action Profile
- Action Objects
- App Rule Actions
- Content Filter Actions
- Object Viewer
- SonicWall Support
Default Rogue Address Groups
SonicOS provides the following default address groups for rogue wireless access points and devices.
- All Rogue Access Points
- All Rogue Devices
When Wireless Intrusion Detection and Prevention (WIDP) is enabled, SonicWave appliances act as both an access point and a sensor detecting any unauthorized access point connected to a SonicWall network.
WIDP automatically adds the detected:
- Rogue access points to the All Rogue Access Points address group
- Rogue devices to the All Rogue Devices address group
For more information about enabling options related to rogue access points, refer to the Configuring Advanced IDP in the SonicOS Connectivity administration documentation.
Was This Article Helpful?
Help us to improve our support portal