Monitoring and Troubleshooting
Wired Connections
How to detect Rogue AP in NSB
3min
rogue aps utilize the nile network and can spoof nile ssid to make wireless clients to get connected to those rogue aps this might cause connectivity/security issues to the end devices login to nile portal https //u1 nile global cloud/ https //u1 nile global cloud/ navigate to nile portal → devices devices page (no rogue access points in this image) nile detects these rogue aps and will be shown in the nile portal under "devices" tab as shown below rogue rogue access points information and count rogue access point alerts can also be detected in alerts page in nile portal navigate to nile portal → alerts button → alerts tab type "rogue" in the search tool; this restricts the listing to only detected rogue access points to see details about the rogue access point, click on the line containing the alert the device detail panel shows the physical ethernet connection being used by the rogue access point so, by tracking the device location and details, you should be able to find the rogue access points, and disconnect from the network if not needed