Detecting and Combatting Rogue Devices 421Nortel WLAN—Management Software 2300 Series Reference GuideDetecting and CombattingRogue DevicesAP radios automatically scan the RF spectrum for other devices transmitting in the same spectrum. The RF scans discoverthird-party transmitters in addition to other Nortel radios. WSS Software considers the non-Nortel transmitters to bedevices of interest, which are potential rogues.You can display information about the devices of interest. To identify friendly devices, such as non-Nortel access pointsin your network or neighbor’s network, you can add them to the known devices list. You also can enable countermeasuresto prevent clients from using the devices that truly are rogues.With WLAN Management Software, you also can display the physical location of a rogue device.Rogue Detection RequirementsRogue detection in WLAN Management Software has the following requirements:• The Enable Rogue Detection option must be selected on the Monitoring Settings section of the WLANManagement Software Services Setup page. (See “Changing Monitoring Settings” (page 466).)• To use countermeasures, they must be enabled. You can enable them on an individual radio profile basis. (See“Viewing and Configuring Radio Profiles” (page 245).)• SNMP notifications must be enabled on the WSSs. Table 1 lists the notification types related to RF detection. Thenotification types for Intrusion Detection System (IDS) and Denial of Service (DoS) protection are also listed. (Toenable notifications on a switch, see “Configuring SNMP” (page 182).)Rogue Detection Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 421Rogue Detection Lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 423Displaying Rogue Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 426Displaying a Rogue’s Geographical Location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 434Ignoring Friendly Third-Party Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 438Adding a Device to the Rogue List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 439Converting a Rogue into a Third Party AP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 439Adding a Rogue’s Clients to the Black List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 440Configuring RF Detection Options from the Organizer Panel . . . . . . . . . . . . . . . . . . 441