Detecting and Combatting Rogue Devices 439Nortel WLAN—Management Software 2300 Series Reference GuideAdding a Device to the Rogue ListThe rogue list is a switch’s list of AP MAC addresses to attack whenever they are present on the network.In the list of rogues on the Alarm screen, select the devices you want to place on the rogue list.Converting a Rogue into a Third Party APIf a device in the alarm list belongs to a third-party AP in your network, you can convert the rogue into a third-party AP.When you convert a rogue into a third-party AP, the rogue disappears from the alarm list, and allows you to place the APin your network plan.To convert a rogue into a third-party AP1 In the list of rogues on the Alarm screen, select the device you want to convert to a third-party AP.Note. Converting a rogue into a third-party AP applies only to the network plan, in WLANManagement Software. WLAN Management Software does not send this information in anyform to the WSSs in the network. To prevent WSS Software from issuing countermeasuresagainst a third-party AP, you must also add the AP to the ignore list. WLAN ManagementSoftware does send the ignore list to the WSSs in the network.