Valid Access Point (AP) checklist

  • Authorized APs are valid

Potentially valid AP

Meet any of the conditions to be considered as potentially valid:

  • A researcher is studying some aspect of 802.11 and needs to have full control of the access point for research purposes.
  • Wireless access is needed for research work and a unique configuration that Information Systems & Technology (IST) cannot support on the campus equipment is required.
  • Equipment with connection requirements that cannot be met by IST supported access points needs to be connected wirelessly to the university network.

After meeting any of the above the AP must still meet all of the following:

  • AP is not already authorized
  • AP is not broadcasting one of the University of Waterloo's SSID (eduroam, uw-unsecured, uw-guest)
  • AP is not broadcasting anything similar to our SSID (anything with UW, waterloo, eduroam in the name)
  • AP is on its authorized channel
  • AP power level must be configured to minimize interference
  • AP must not expose the university network to unauthorized use
  • AP is not located within university residences

This AP can then be considered as potentially valid. It needs authorization to become valid.

Rogue checklist

Meet all conditions to be defined as a rogue:

  • No authorization to operate the access point
  • User owned wireless access point using 2.4Ghz or 5Ghz
  • AP is being used on the University of Waterloo campus

the AP is defined as a rogue

If the AP is authorized and changes to meet any of these conditions it will be reclassified as rogue:

  • AP is broadcasting one of our SSID (eduroam, uw-unsecured, uw-guest)
  • AP is broadcasting anything similar to our SSID (anything with UW, waterloo, eduroam in the name)
  • The authorization period for the AP has expired
  • AP is not in its authorized location
  • AP is not on its authorized channel
  • AP exposes the UW network to unauthorized use
  • AP is operating in greenfield 40Mhz only mode

Interfering AP

  • Any AP that is not classified as rogue or authorized is interfering (Example: A neighbouring business access point)