When you enable a wireless intrusion prevention system (WIPS) on your network, APs that do not comply with the WIPS are considered rogue and are listed under Manage > Security > Rogue APs. If an AP that does not comply with WIPS appears here, and you are sure that it is a valid device, you can remove it. You might also want to reconfigure the WIPS policy settings.
A graph displays a colored timeline representing data captured for rogue APs within the specified time frame. You can change the time frame using the Time Range controls. For more information, see Set the Time Frame for Captured Data Displays and Reports. Details about the data captured within this time frame are listed in the table below the graph.
View the table as follows:
By default, the table displays the following information:
You can configure your WIPS policy to mitigate rogue APs manually or automatically. For more information about how to configure mitigation, see WIPS Policy Settings.