So you know how this works. Your access points will spoof the mac address of the rogue access point and will flood the air with deauthentication frames. This tells clients that want to attach to the rogue access point to "go away".
As Scott points out there could be legal ramifications to this.
"Satisfaction does not come from knowing the solution, it comes from knowing why." - Rosalind Franklin