<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: rogue access point in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/rogue-access-point/m-p/4589667#M240671</link>
    <description>&lt;P&gt;Its security reason we need to detect and block it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;check some good documents:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/wireless/4400-series-wireless-lan-controllers/112045-handling-rogue-cuwn-00.html#anc9" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/wireless/4400-series-wireless-lan-controllers/112045-handling-rogue-cuwn-00.html#anc9&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 10 Apr 2022 09:48:39 GMT</pubDate>
    <dc:creator>balaji.bandi</dc:creator>
    <dc:date>2022-04-10T09:48:39Z</dc:date>
    <item>
      <title>rogue access point</title>
      <link>https://community.cisco.com/t5/wireless/rogue-access-point/m-p/4589627#M240667</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;What is the benefit of blocking&amp;nbsp; detected rogue access points&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Sun, 10 Apr 2022 03:39:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/rogue-access-point/m-p/4589627#M240667</guid>
      <dc:creator>bluesea2010</dc:creator>
      <dc:date>2022-04-10T03:39:20Z</dc:date>
    </item>
    <item>
      <title>Re: rogue access point</title>
      <link>https://community.cisco.com/t5/wireless/rogue-access-point/m-p/4589667#M240671</link>
      <description>&lt;P&gt;Its security reason we need to detect and block it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;check some good documents:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/wireless/4400-series-wireless-lan-controllers/112045-handling-rogue-cuwn-00.html#anc9" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/wireless/4400-series-wireless-lan-controllers/112045-handling-rogue-cuwn-00.html#anc9&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Apr 2022 09:48:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/rogue-access-point/m-p/4589667#M240671</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2022-04-10T09:48:39Z</dc:date>
    </item>
    <item>
      <title>Re: rogue access point</title>
      <link>https://community.cisco.com/t5/wireless/rogue-access-point/m-p/4589674#M240672</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I did containment for multiple rogue ap , but still users can connect and use it&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Apr 2022 11:05:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/rogue-access-point/m-p/4589674#M240672</guid>
      <dc:creator>bluesea2010</dc:creator>
      <dc:date>2022-04-10T11:05:59Z</dc:date>
    </item>
    <item>
      <title>Re: rogue access point</title>
      <link>https://community.cisco.com/t5/wireless/rogue-access-point/m-p/4589681#M240675</link>
      <description>&lt;P&gt;"Blocking detected rogue access points" this is a very sensitive topic as this is illegal in certain countries. Rogue Access point containment if done, must be done very carefully and preferably manually. In order for you to have a well working containment scenario you need to have the proper AP's (AP's with RF ASIC) or dedicated monitor mode AP's. If not best effort containment will be provided by client serving AP's when it goes off-channel. Also if you are deploying monitor mode AP's the AP positioning must be considered as well.&amp;nbsp;&lt;BR /&gt;Why we need to do rogue ap containment?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There are many reasons, the most prominent one is to avoid evil twin AP's impersonating your wireless ssid's, avoid unauthorized AP connected to your LAN extending your wired LAN access, then there might be a business requirement where you have to prevent anyother AP's working in your premises, security policy demands etc.&lt;/P&gt;
&lt;P&gt;How it works? Different vendors use different mechanisms, Cisco prominently use deauth broadcast spoofing rogue ap bssid source, deauth unicast spoofing the rogue ap bssid as source and destination client mac and also spoofing client mac sending deauth to rogue AP.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;How effective? Certain newer clients simply ignore the deauth's and disassoc's when sent by the WIPS. In my extensive testing with numerous BU engineers we noticed that Cisco be default uses deauth frequency of 500msec&amp;nbsp;contain rogue client at Auth phase, but this is not sufficient to effectively contain as client either ignores this or reassocaite very quickly. So we tested with lower values and we found 150msec to be somewhat working, but still not perfect.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So test this in your own environment and keep in mind this will work only if you have the correct infrastructure. If possible try to migrate to WPA3, but considering client support and the WLC side undiscovered bugs due to less usage this might be a challenge.&lt;/P&gt;</description>
      <pubDate>Sun, 10 Apr 2022 12:03:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/rogue-access-point/m-p/4589681#M240675</guid>
      <dc:creator>Arshad Safrulla</dc:creator>
      <dc:date>2022-04-10T12:03:00Z</dc:date>
    </item>
    <item>
      <title>Re: rogue access point</title>
      <link>https://community.cisco.com/t5/wireless/rogue-access-point/m-p/4589696#M240678</link>
      <description>&lt;P&gt;Most importantly make sure the AP you contain is really an "evil" rogue and not just a neighbour (by default everything is classified as a rogue even if it is harmless)&lt;/P&gt;
&lt;P&gt;If you contain your neighbours' APs without a justifiable legal reason you will be breaking the law and subject to litigation by the victim and the authorities in most countries.&lt;/P&gt;
&lt;P&gt;One of our customers with severely degraded service was the victim of such an attack when the neighbour enabled containment on their Meraki network without understanding what it actually did.&amp;nbsp; After we tracked the source of the attack and had a polite chat with the network administrator who had enabled containment it was very promptly disabled with profuse apologies.&lt;/P&gt;</description>
      <pubDate>Sun, 10 Apr 2022 13:13:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/rogue-access-point/m-p/4589696#M240678</guid>
      <dc:creator>Rich R</dc:creator>
      <dc:date>2022-04-10T13:13:18Z</dc:date>
    </item>
    <item>
      <title>Re: rogue access point</title>
      <link>https://community.cisco.com/t5/wireless/rogue-access-point/m-p/4590023#M240704</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/465548"&gt;@Arshad Safrulla&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;So test this in your own environment and keep in mind this will work only if you have the correct infrastructure. If possible try to migrate to WPA3, but considering client support and the WLC side undiscovered bugs due to&lt;STRONG&gt; less usage t&lt;/STRONG&gt;his might be a challenge&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;What is less usage here&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Apr 2022 09:21:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/rogue-access-point/m-p/4590023#M240704</guid>
      <dc:creator>bluesea2010</dc:creator>
      <dc:date>2022-04-11T09:21:58Z</dc:date>
    </item>
  </channel>
</rss>

