Welcome to Cisco Support Community. We would love to have your feedback.
For an introduction to the new site, click here. If you'd prefer to explore, try our test area to get started. And see here for current known issues.
Besides simply classifying devices as rogues, is there a way to shut them down or overwhelm them with deauthentication or disaccociation floods, something of the sort?
You can contain the rogue, but then you can get in trouble for that since it is a DoS attack.
Thanks, Scott Help out other by using the rating system and marking answered questions as "Answered"