Specifications

5-36 WS2000 Wireless Switch System Reference Guide
To enable and configure Rogue AP Containment:
1. Check the Enable Rogue AP Containment box to enable this feature.
2. All MUs associated to Rogue APs in the Rogue AP Containment list are deauthenticated by the switch.
The Deauth Interval value sets the time duration in seconds between two such de-authentications. For
example, if the time duration is 2 seconds, the switch de-authenticates MUs associated with Rogue APs
every 2 seconds. This is only available when Rogue AP Containment is enabled.
3. Check the Deauth all APs in Rogue List box to force de-authentication of all the APs listed in the
Rogue AP list. This is only available when Rogue AP Containment is enabled.
4. The Rogue AP Containment list is a list of MAC addresses of APs that have been contained. Use the
Remove AP from Deauth List button to remove a selected AP from the containment list. When
removed, the AP can associate itself with the network and allow MUs to associate with it.
5.9.3.4 Getting Detailed Information About a Rogue AP
The Rule List screen provides a means to get detailed information about a rogue Access Port as well as its
detector to help an administrator track it down. To see detailed information:
1. Select a rogue AP from the Rogue AP List.
2. Click the Detail button to open a new window to view detailed information about the rogue AP and its
detector.
Details About the Rogue AP
The top of the Rogue AP Detail screen lists information about the rogue AP:
BSSID/MAC This field contains the BSSID or the MAC address for the rogue AP.
ESSID This field is the ESSID for the rogue AP.
RSSI This field displays the Receiver Signal Strength Indicator (RSSI) for the
rogue AP. The value will be between 1 and 255. The larger the value, the
better the signal strength and the closer the AP.