User's Manual Part 1

When the checkbox is checked it ensures that the client implements the Rogue AP
feature as required by CCX. The client makes note of APs that it failed to authenticate
with and sends this information to the AP that allows it to authenticate and connect. Also,
the supplicant sets the Authentication algorithm type to 0x80 when the Rogue AP box is
checked. There may be some network configurations implementing and Open and
Required EAP only as described above. For this setup to work, the client must use an
Authentication Algorithm value of 0x0, as opposed to the need to use 0x80 for
Network-
EAP only described above. Therefore, the Rogue AP checkbox also enables the client to
support Network-EAP only and Open and Required EAP only.
Cisco CCX Feature Support
The Cisco mandatory Client Compliance Specifications Version1.0:
Compliance to all mandatory items of 802.11
De-fragmentation of MSDUs and MMPDUs
Generate CTS in response to an RTS
Open and Shared key authentication support
Support Active scanning
Wi-Fi compliance required
On Windows platforms, Microsoft 802.11 NIC compliance
802.1X-2001 Compliance
EAP-TLS (Transport Level Security, RFC 2716) support on Windows XP
EAP-MD4 (RFC 1320) support on Windows XP
EAP packets to be sent unencrypted
Broadcast key rotation support
CKIP support
WEP/RC4 support
Support of 4 keys for WEP
Both WEP40 and WEP128 keys are supported