Specifications

Wireless Configuration 5-35
1. Enter a number in the Rogue Entries Age Out Time field to indicate the number of elapsed minutes
before an AP will be removed from the rogue list and reevaluated. A zero (0) in this field indicates that
an AP can stay on the list permanently.
2. Click the Add to Approved AP Rule List button to add a rule to the Approved APs' Rule Management
table of the Rogue AP Detection screen. The generated rule will use the MAC address and ESSID of the
selected AP.
3. Click the Add All to Approved AP Rule List button to add a rule to the Approved APs' Rule
Management table on the Rogue AP Detection screen for all the APs on the list. The generated rules will
use the MAC addresses and ESSIDs of the APs.
4. Click the Add to Containment List button to add a selected Rogue AP to a containment list. The
containment list is a list of APs that will not be allowed to join the network. MUs associated with APs in
the containment list are de-authenticated every time interval defined in the Deauth Interval field.
5.9.3.3 Rogue AP Containment
Rogue AP Containment feature enables you to prevent rogue APs and their associated MUs from joining your
network. This feature is disabled by default.
NOTE: Rogue AP Containment should only be used to contain those APs that adversely impact the network
and its devices.
First Seen This field indicates the number of elapsed hours since the rogue AP was first noticed on the
network in hours:minutes:seconds.
Last Seen This field indicates the number of elapsed hours since the rogue AP was last noticed on the
network in hours:minutes:seconds.
Reporting AP This field shows the MAC address of the device that detected the rogue AP.