User Guide

Table Of Contents
Rogue Detection and Countermeasures 543
Nortel WLAN Security Switch 2300 Series Configuration Guide
Configuring Rogue Detection Lists
The following sections describe how to configure lists to specify the devices that are allowed on the network
and the devices that WSS Software should attack with countermeasures.
(For information about how WSS Software uses the lists, see “Rogue Detection Lists” on page 538.)
Ignore list List of MAC addresses to ignore
during RF detection. WSS Software
does not classify devices on this list as
rogues or interfering devices, and does
not issue countermeasures against
them.
Yes Yes
Countermeasures Packets sent by Nortel APs to interfere
with the operation of a rogue.
Countermeasures are configurable a
radio-profile basis.
Yes Yes
Active scan Active scan sends probe any requests
(probes with a null SSID name) to look
for rogue APs.
Active scan is configurable on a
radio-profile basis.
Yes No
Nortel AP signature Value in an AP’s management frames
that identifies the AP to WSS
Software. AP signatures help prevent
spoofing of the AP MAC address.
No No
Log messages and
traps
Messages and traps for rogue activity.
Messages are described in “IDS and
DoS Alerts” on page 550.
Yes Yes
Table 33: Rogue Detection Features (continued)
Rogue Detection
Feature
Description
Applies To
Third-Party
APs
Clients