625Nortel WLAN—Security Switch 2300 Series Configuration GuideRogue detection and countermeasuresAP radios automatically scan the RF spectrum for other devices transmitting in the same spectrum. The RF scansdiscover third-party transmitters in addition to other Nortel radios. WSS Software considers the non-Nortel transmittersto be devices of interest, which are potential rogues.You can display information about the devices of interest. To identify friendly devices, such as non-Nortel access pointsin your network or neighbor’s network, you can add them to the known devices list. You also can enable countermea-sures to prevent clients from using the devices that truly are rogues.With WLAN Management Software, you also can display the physical location of a rogue device. (For more informa-tion, see the Nortel WLAN Management Software 2300 Series Reference Guide.)About rogues and RF detectionRF detection detects all the IEEE 802.11 devices in a Mobility Domain and can single out the unauthorized rogue accesspoints.Rogue access points and clientsA rogue access point is an access point that is not authorized to operate in a network. Rogue access points and theirclients undermine the security of an enterprise network by potentially allowing unchallenged access to the network byany wireless user or client in the physical vicinity. Rogue access points and users can also interfere with the operation ofyour enterprise network.About rogues and RF detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 625Summary of rogue detection features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 630Configuring rogue detection lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 631Enabling countermeasures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 636Disabling or reenabling Scheduled RF Scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . 637Enabling AP signatures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 637Disabling or reenabling logging of rogues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 638Enabling rogue and countermeasures notifications . . . . . . . . . . . . . . . . . . . . . . . . . . 638IDS and DoS alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 638Displaying RF detection information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 643