Adding a Device to the Rogue List
The rogue list is a switch's list of AP MAC addresses to attack whenever they are present on the network.
In the list of rogues on the Alarm screen, select the devices you want to place on the rogue list.
Converting a Rogue into a Third Party AP
If a device in the alarm list belongs to a third-party AP in your network, you can convert the rogue into a third-party AP.
When you convert a rogue into a third-party AP, the rogue disappears from the alarm list, and allows you to place the AP
in your network plan.
Note.
Converting a rogue into a third-party AP applies only to the network plan, in WLAN
Management Software. WLAN Management Software does not send this information in any
form to the WSSs in the network. To prevent WSS Software from issuing countermeasures
against a third-party AP, you must also add the AP to the ignore list. WLAN Management
Software does send the ignore list to the WSSs in the network.
To convert a rogue into a third-party AP
1
In the list of rogues on the Alarm screen, select the device you want to convert to a third-party AP.
Nortel WLAN—Management Software 2300 Series Reference Guide
Detecting and Combatting Rogue Devices 439