Rogue detection and counter measures 627
Nortel WLAN—Security Switch 2300 Series Configuration Guide
All the lists except the black list require manual configuration. You can configure entries in the black list and
WSS Software also can place a client in the black list due to an association, reassociation or disassociation
flood from the client.
The rogue classification algorithm examines each of these lists when determining whether a device is a rogue.
Figure 1 shows how the rogue detection algorithm uses the lists.