CLI Reference Guide
426 CHAPTER 11: DETECTING AND COMBATTING ROGUE DEVICES
3WXM Services keeps events in a circular log. Once the log becomes full,
3WXM Services purges old entries to make room for new ones. However,
the 3WXM Services never purges the entries for the first appearance and
first disappearance of a rogue.
Toolbar Options The Rogue Detection tab has a toolbar. Table 59 lists the options on the
toolbar.
Filtering the Rogue
List
By default, the rogue list contains all rogues detected during the
most-recent polling interval, in all Mobility Domains in the network plan.
You can change the time period for which rogues are listed as well as the
scope of the list.
To filter the rogue list
1 Click Filters on the Rogue Detection tab’s toolbar. The Rogue List Filter
Options dialog box appears.
Table 59 Toolbar Options on Rogue Detection Tab
Option Description
Refresh Refreshes the data by immediately polling the monitoring
service when you click the icon.
Auto Refresh Sets the window to automatically refresh the data at
regular intervals, based on the polling interval set on the
monitoring service for rogue detection.
Filters Opens the Rogue List Filter Options dialog box, which
enables you to filter the rogue list.
Show for selected
scope
When selected, this option restricts the rogue list to the
scope of the object selected in the Organizer panel.
When this option is not selected, the rogue list includes all
Mobility Domains in the network plan.
Locate Displays the rogue’s location on the floor plan. (See
“Displaying a Rogue’s Geographical Location” on
page 430.)
Create Known Address Adds the selected MAC address to the ignore list and
removes it from the rogue list.
Create Third Party AP Changes the selected MAC address from a rogue into a
third-party AP.