<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic CLI management of Rogue list in WIPS and more in Unleashed</title>
    <link>https://community.ruckuswireless.com/t5/Unleashed/CLI-management-of-Rogue-list-in-WIPS-and-more/m-p/41077#M4018</link>
    <description>Hi&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;I operate a ZD and an unleashed network. On both of them I activated WIPS with Rogue AP detection and protection.&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Could someone explain me :&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;- What is the purpose of the "User Blocked Rogue Devices". Aren't they blocked as soon as they are detected except if they are in the "known" list ?&lt;BR /&gt;- I found a way to get the Rogue list by CLI. Does CLI commands exist to manage the Known/Blocked list (ie to automatically add a newly detected AP to the Blocked list) ?&lt;BR /&gt;- As far as I understand, the AP detects only rogue AP using their own channel. Is there a way to dedicate on (ore more) AP to scan all channels to detect &amp;amp; block rogue APs ?&lt;BR /&gt;- Is the deauthentification really efficient enough to provide internal users to install local AP / share their CellPhone network ?&lt;BR /&gt;&lt;BR /&gt;Thanks in advance</description>
    <pubDate>Fri, 22 May 2020 16:22:09 GMT</pubDate>
    <dc:creator>paul_courbis_de</dc:creator>
    <dc:date>2020-05-22T16:22:09Z</dc:date>
    <item>
      <title>CLI management of Rogue list in WIPS and more</title>
      <link>https://community.ruckuswireless.com/t5/Unleashed/CLI-management-of-Rogue-list-in-WIPS-and-more/m-p/41077#M4018</link>
      <description>Hi&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;I operate a ZD and an unleashed network. On both of them I activated WIPS with Rogue AP detection and protection.&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Could someone explain me :&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;- What is the purpose of the "User Blocked Rogue Devices". Aren't they blocked as soon as they are detected except if they are in the "known" list ?&lt;BR /&gt;- I found a way to get the Rogue list by CLI. Does CLI commands exist to manage the Known/Blocked list (ie to automatically add a newly detected AP to the Blocked list) ?&lt;BR /&gt;- As far as I understand, the AP detects only rogue AP using their own channel. Is there a way to dedicate on (ore more) AP to scan all channels to detect &amp;amp; block rogue APs ?&lt;BR /&gt;- Is the deauthentification really efficient enough to provide internal users to install local AP / share their CellPhone network ?&lt;BR /&gt;&lt;BR /&gt;Thanks in advance</description>
      <pubDate>Fri, 22 May 2020 16:22:09 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Unleashed/CLI-management-of-Rogue-list-in-WIPS-and-more/m-p/41077#M4018</guid>
      <dc:creator>paul_courbis_de</dc:creator>
      <dc:date>2020-05-22T16:22:09Z</dc:date>
    </item>
  </channel>
</rss>

