
6-159
Using the Command Line Interface
Rogue AP Detection Commands
A “rogue AP” is either an access point that is not authorized to participate in the
wireless network, or an access point that does not have the correct security
configuration. Rogue APs can potentially allow unauthorized users access to the
network. Alternatively, client stations may mistakenly associate to a rogue AP and
be prevented from accessing network resources. Rogue APs may also cause radio
interference and degrade the wireless LAN performance.
The access point can be configured to periodically scan all radio channels and find
other access points within range. A database of nearby access points is
maintained where any rogue APs can be identified.
Table 27
Rogue AP Commands
rogue-ap enable
This command enables the periodic detection of nearby access points. Use the
no
form to disable periodic detection.
Syntax
[no] rogue-ap enable
Default Setting
Disabled
Command Mode
Interface Configuration (Wireless)
Command Usage
• While the access point scans a channel for rogue APs, wireless clients will
not be able to connect to the access point. Therefore, avoid frequent
Command
Function
Mode
Page
rogue-ap enable
Enables the periodic detection of other nearby access
points
GC
6-159
rogue-ap authenticate
Enables identification of all access points
GC
6-160
rogue-ap duration
Sets the duration that all channels are scanned
GC
6-161
rogue-ap interval
Sets the time between each scan
GC
6-162
rogue-ap scan
Forces an immediate scan of all radio channels
GC
6-162
show rogue-ap
Shows the current database of detected access points Exec
6-163
Summary of Contents for 3CRWEASYA73 / WL-575
Page 18: ...1 10 ...
Page 93: ...5 45 WDS and Spanning Tree Settings Figure 40 Spanning Tree Protocol ...
Page 132: ...5 84 CHAPTER 5 SYSTEM CONFIGURATION ...
Page 320: ...A 4 ...
Page 332: ...Glossary 6 ...