Upgrade your OS version to minimum 7.x
Any device that shares your spectrum and is not managed by you can be considered a rogue. A rogue becomes dangerous in the following scenarios:
•When the Rogue AP uses the same SSID as your network (honeypot).
•When the Rougue AP device is detected on wired network also.
•Ad-hoc rogues are also a big threat.
•Setup by an outsider with malicious intent.
There are three main phases of rogue device management in Cisco Unified Wireless Network (UWN) solution:
•Detection - Radio Resource Management (RRM) scanning is used to detect the presence of rogue devices.
•Classification - Rogue Location Discovery Protocol (RLDP), Rogue Detectors and switch port tracing are used to identify if the rogue device is connected to the wired network. Rogue classification rules also assist in filtering rogues into specific categories based on their characteristics.
•Mitigation - Switch port Trace and shutting down, rogue location, and rogue containment are used to track down physical location and nullify the threat of rogue devices.