Rogue detection and counter measures 627
All the lists except the black list require manual configuration. You can configure entries in the black list and
WSS Software also can place a client in the black list due to an association, reassociation or disassociation
flood from the client.
The rogue classification algorithm examines each of these lists when determining whether a device is a rogue.
Figure 1
shows how the rogue detection algorithm uses the lists.
Nortel WLAN—Security Switch 2300 Series Configuration Guide