<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: AP Containment in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/ap-containment/m-p/1146770#M16090</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes this does help, but I am more concerned with our wireless clients trying to connect to&lt;/P&gt;&lt;P&gt;a rogue AP advertising our SSID, the rogue may or may not be wired in to our LAN. My thoughts are that to rely on manual AP containment is slightly risky as it requires a member of the support staff to look at the WCS logging.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My hopes are that the new Cisco mobility services IDS/IPS offering will automate this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for you answers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mark&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 28 Jan 2009 20:05:41 GMT</pubDate>
    <dc:creator>mark.cronin</dc:creator>
    <dc:date>2009-01-28T20:05:41Z</dc:date>
    <item>
      <title>AP Containment</title>
      <link>https://community.cisco.com/t5/wireless/ap-containment/m-p/1146768#M16088</link>
      <description>&lt;P&gt;Need Clarification&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can the AP containment feature on &lt;/P&gt;&lt;P&gt;CUWN 4.2 be automated to contain rogue APs that are advertising your SSID or is this a manual procedure.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can the new Cisco mobilty service engine IDS/IPS system do this automatically?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can Air defense / Air tight / Air Magnet do this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mark&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 04 Jul 2021 00:02:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ap-containment/m-p/1146768#M16088</guid>
      <dc:creator>mark.cronin</dc:creator>
      <dc:date>2021-07-04T00:02:17Z</dc:date>
    </item>
    <item>
      <title>Re: AP Containment</title>
      <link>https://community.cisco.com/t5/wireless/ap-containment/m-p/1146769#M16089</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Containment of Rogue AP can only be done manually.  Auto Containment of "Rogue on Wire" and/or "AdHoc Rogue AP", on the other hand, is turned off by default.  To enable this feature, go to Security -&amp;gt; Wireless Protection Policies -&amp;gt; Rogue Policies -&amp;gt; General.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does this help?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Jan 2009 01:36:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ap-containment/m-p/1146769#M16089</guid>
      <dc:creator>Leo Laohoo</dc:creator>
      <dc:date>2009-01-27T01:36:51Z</dc:date>
    </item>
    <item>
      <title>Re: AP Containment</title>
      <link>https://community.cisco.com/t5/wireless/ap-containment/m-p/1146770#M16090</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes this does help, but I am more concerned with our wireless clients trying to connect to&lt;/P&gt;&lt;P&gt;a rogue AP advertising our SSID, the rogue may or may not be wired in to our LAN. My thoughts are that to rely on manual AP containment is slightly risky as it requires a member of the support staff to look at the WCS logging.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My hopes are that the new Cisco mobility services IDS/IPS offering will automate this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for you answers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mark&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Jan 2009 20:05:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ap-containment/m-p/1146770#M16090</guid>
      <dc:creator>mark.cronin</dc:creator>
      <dc:date>2009-01-28T20:05:41Z</dc:date>
    </item>
    <item>
      <title>Re: AP Containment</title>
      <link>https://community.cisco.com/t5/wireless/ap-containment/m-p/1146771#M16091</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you are concerned about clients connecting to a Rogue AP with the same SSID (aka "Honeypot"), the WLC/WCS will flag this alarm.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One of the logic why this is not incorporated into the automation is the risk associated that "somebody" in the organization may have innocently setup their very-own AP for company use without telling everyone.  There's also a risk of your organization if the WLC/WCS will attack legitimate AP it considers as "Rogue".  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;True, IPS/IDS will do the trick, but I've been doing this for the past 2 years and I'd rather be the one to throw the switch for the WLC/WCS to contain a possible Rogue AP than let the machine do it for you.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For instance, I saw a a firmware bug where an AP was flagged by the WLC and the WCS as a suspected Honeypot.  Upon closer inspection, the so-called Honeypot is an AP register to the same WLC and therefore legitimate.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In my humble opinion ... &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Jan 2009 21:14:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ap-containment/m-p/1146771#M16091</guid>
      <dc:creator>Leo Laohoo</dc:creator>
      <dc:date>2009-01-29T21:14:42Z</dc:date>
    </item>
    <item>
      <title>Re: AP Containment</title>
      <link>https://community.cisco.com/t5/wireless/ap-containment/m-p/1146772#M16092</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;looks like I need to convince the support staff to look at the logs&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Jan 2009 21:20:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ap-containment/m-p/1146772#M16092</guid>
      <dc:creator>mark.cronin</dc:creator>
      <dc:date>2009-01-29T21:20:15Z</dc:date>
    </item>
    <item>
      <title>Re: AP Containment</title>
      <link>https://community.cisco.com/t5/wireless/ap-containment/m-p/1146773#M16093</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If this resolves your post, can you tick "resolved"?  Thanks. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Feb 2009 00:50:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ap-containment/m-p/1146773#M16093</guid>
      <dc:creator>Leo Laohoo</dc:creator>
      <dc:date>2009-02-04T00:50:46Z</dc:date>
    </item>
    <item>
      <title>Re: AP Containment</title>
      <link>https://community.cisco.com/t5/wireless/ap-containment/m-p/1146774#M16094</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;here is some further info on rogue containment&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/tech/tk722/tk809/technologies_white_paper09186a0080722d8c.shtml" target="_blank"&gt;http://www.cisco.com/en/US/tech/tk722/tk809/technologies_white_paper09186a0080722d8c.shtml&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 21 Feb 2009 18:24:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ap-containment/m-p/1146774#M16094</guid>
      <dc:creator>George Stefanick</dc:creator>
      <dc:date>2009-02-21T18:24:10Z</dc:date>
    </item>
  </channel>
</rss>

