Viewing Rogue Access Points

Rogue (or unauthorized) APs pose problems for a wireless network in terms of airtime contention, as well as security.

Usually, a rogue AP appears in the following way: an employee obtains another manufacturer's AP and connects it to the LAN, to gain wireless access to other LAN resources. This would potentially allow even more unauthorized users to access your corporate LAN - posing a security risk. Rogue APs also interfere with nearby Ruckus APs, thus degrading overall wireless network coverage and performance.

The controller's rogue AP detection options include identifying the presence of a rogue AP, categorizing it as either a known neighbor AP or as a malicious rogue.

If you enabled rogue AP detection when you configured the common AP settings (see Configuring APs), click Report > Rogue Access Points. The Rogue Access Points page displays all rogue APs that the controller has detected on the network, including the following information:

  • Rogue MAC: MAC address of the rogue AP.
  • Type: Rogue, a normal rogue AP, not yet categorized as malicious or non-malicious.
  • Channel: Radio channel used by the rogue AP.
  • Radio: WLAN standards with which the rogue AP complies.
  • SSID: WLAN name that the rogue AP is broadcasting.
  • Detecting AP Name: Name of the AP.
  • Zone: Zone to which the AP belongs.
  • RSSI: Radio signal strength.
  • Encryption: Indicates whether the wireless signal is encrypted or not.
  • Last Detected: Date and time when the rogue AP was last detected by the controller.