![](/images/new-backgrounds/1193299/193299495x1.webp)
Rogue AP Detection Commands 7
Example
Enterprise
configure either syslog or trap or both to receive the rogue APs detected.
Enterprise
rogue-ap authenticate
This command forces the unit to authenticate all access points on the network. Use the no form to disable this function.
Syntax
[no] rogue-ap authenticate
Default Setting
Disabled
Command Mode
Interface Configuration (Wireless)
Command Usage
Enabling authentication in conjunction with a database of approved access points stored on a RADIUS server allows the access point to discover rogue APs. With authentication enabled and a configure RADIUS server, the access point checks the MAC address/Basic Service Set Identifier (BSSID) of each access point that it finds against a RADIUS server to determine whether the access point is allowed. With authentication disabled, the access point can identify its neighboring access points only; it cannot identify whether the access points are allowed or are rogues. If you enable authentication, you should also configure a RADIUS server for this access point (see “RADIUS” on page
Example
Enterprise
Enterprise
rogue-ap duration
This command sets the scan duration for detecting access points.
Syntax
rogue-ap duration <milliseconds>
milliseconds - The duration of the scan. (Range: