232 Operation
Chapter 5 - Command Line Interface
the show rogue-ap command.
The AP sends Syslog messages for each detected AP during a rogue AP scan.
Example
5.19.2 rogue-ap authenticate

This command forces the unit to authenticate all APs on the network. Use the no

form to disable this function.

Syntax
[no] rogue-ap authenticate
Default Setting
Disabled
Command Mode
Interface Configuration (Wireless)
Command Usage
Enabling authentication in conjunction with a database of approved APs stored on a RADIUS
server allows the AP to discover rogue APs. With authentication enabled and a configure RADIUS
server, the AP checks the MAC address/Basic Service Set Identifier (BSSID) of each AP that it
finds against a RADIUS server to determine whether the AP is allowed. With authentication
disabled, the AP can identify its neighboring APs only; it cannot identify whether the APs are
allowed or are rogues. If you enable authentication, you should also configure a RADIUS server
for this AP (see “RADIUS” on page 52).
Example
5.19.3 rogue-ap duration

This command sets the scan duration for detecting APs.

Syntax
rogue-ap duration <milliseconds>
milliseconds - The duration of the scan. (Range:100-1000 milliseconds)
Default Setting
350 milliseconds
Command Mode
Interface Configuration (Wireless)
Command Usage
During a scan, client access may be disrupted and new clients may not be able to associate to
the AP. If clients experience severe disruption, reduce the scan duration time.
A long scan duration time will detect more APs in the area, but causes more disruption to client
access.
Enterprise AP(if-wireless g)#rogue-ap enable
configure either syslog or trap or both to receive the rogue APs detected.
Enterprise AP(if-wireless g)#
Enterprise AP(if-wireless g)#rogue-ap authenticate
Enterprise AP(if-wireless g)#