17 DETECTING AND COMBATTING

ROGUE DEVICES

This chapter discusses how to manage rogue devices that try to use your
wireless network. Information includes an overview of detection features,
enabling countermeasures, using the Rogue Detection tab, displaying a
rogue’s geographical location, ignoring friendly third-party devices, and
converting a rogue into a third party AP.
Overview MAP radios automatically scan the RF spectrum for other devices
transmitting in the same spectrum. The RF scans discover third-party
transmitters in addition to other 3Com radios. MSS considers the
third-party transmitters to be devices of interest, which are potential
rogues.
You can display information about the devices of interest. To identify
friendly devices, such as non-3Com access points in your network or
neighbor’s network, you can add them to the known devices list. You also
can enable countermeasures to prevent clients from using the devices
that truly are rogues.
With 3WXM, you also can display the physical location of a rogue device.