<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Rogue AP Policies and Best Practices in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/rogue-ap-policies-and-best-practices/m-p/4863159#M257502</link>
    <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;AP Authentication is related to your Access Point, not the rogues. With that feature, you can create authentication for your APs, similar to clients. Sounds like a good idea but can create a lot of problem. I would not recommend. &lt;/P&gt;
&lt;P&gt;"When I receive a rogue AP minor alarm, and I identify that it is a harmless Wi-fi access point from a business around the building, what happens if I classify it as friendly? "&lt;/P&gt;
&lt;P&gt;&amp;nbsp;The alarm will not be generated again. If you do not classify as frendly I will be receiving alarms about that AP all the time.&lt;/P&gt;
&lt;P&gt;"It is a security flaw if I do it?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;I dont believe so.&lt;/P&gt;
&lt;P&gt;"In the future, if that WAP becomes dangerous, how would I identify it? A new alert would be reported if for example the SSID was changed?"&lt;/P&gt;
&lt;P&gt;&amp;nbsp; The only possibility I can see for that AP to become "Dangerous" would be if the AP´s owner start advertising your SSIDs or start the containement for your SSIDs. And this could be identify through others logs also.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 27 Jun 2023 12:27:49 GMT</pubDate>
    <dc:creator>Flavio Miranda</dc:creator>
    <dc:date>2023-06-27T12:27:49Z</dc:date>
    <item>
      <title>Rogue AP Policies and Best Practices</title>
      <link>https://community.cisco.com/t5/wireless/rogue-ap-policies-and-best-practices/m-p/4863068#M257490</link>
      <description>&lt;P&gt;Dear Cisco Community,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am trying to undesrtand the best practices and the best policies to deal with Rogue APs, and many doubts emerged. Let me just clarify that I am just a beginer.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Under &lt;STRONG&gt;Rogue Policies&lt;/STRONG&gt; on the &lt;STRONG&gt;Wireless Controller&lt;/STRONG&gt;, the &lt;STRONG&gt;AP Authentication&lt;/STRONG&gt;, If I select that option is just to confirm what kind of authentication the rogue AP is using when a new one is detected?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When I receive a rogue AP minor alarm, and I identify that it is a harmless Wi-fi access point from a business around the building, what happens if I classify it as friendly? It is a security flaw if I do it? In the future, if that WAP becomes dangerous, how would I identify it? A new alert would be reported if for example the SSID was changed?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you in advance!&lt;/P&gt;&lt;P&gt;Best regards!&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jun 2023 09:26:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/rogue-ap-policies-and-best-practices/m-p/4863068#M257490</guid>
      <dc:creator>DarioPouseiro</dc:creator>
      <dc:date>2023-06-27T09:26:30Z</dc:date>
    </item>
    <item>
      <title>Re: Rogue AP Policies and Best Practices</title>
      <link>https://community.cisco.com/t5/wireless/rogue-ap-policies-and-best-practices/m-p/4863159#M257502</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;AP Authentication is related to your Access Point, not the rogues. With that feature, you can create authentication for your APs, similar to clients. Sounds like a good idea but can create a lot of problem. I would not recommend. &lt;/P&gt;
&lt;P&gt;"When I receive a rogue AP minor alarm, and I identify that it is a harmless Wi-fi access point from a business around the building, what happens if I classify it as friendly? "&lt;/P&gt;
&lt;P&gt;&amp;nbsp;The alarm will not be generated again. If you do not classify as frendly I will be receiving alarms about that AP all the time.&lt;/P&gt;
&lt;P&gt;"It is a security flaw if I do it?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;I dont believe so.&lt;/P&gt;
&lt;P&gt;"In the future, if that WAP becomes dangerous, how would I identify it? A new alert would be reported if for example the SSID was changed?"&lt;/P&gt;
&lt;P&gt;&amp;nbsp; The only possibility I can see for that AP to become "Dangerous" would be if the AP´s owner start advertising your SSIDs or start the containement for your SSIDs. And this could be identify through others logs also.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jun 2023 12:27:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/rogue-ap-policies-and-best-practices/m-p/4863159#M257502</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2023-06-27T12:27:49Z</dc:date>
    </item>
    <item>
      <title>Re: Rogue AP Policies and Best Practices</title>
      <link>https://community.cisco.com/t5/wireless/rogue-ap-policies-and-best-practices/m-p/4863539#M257544</link>
      <description>&lt;P&gt;Generally I set the rules like this:&lt;BR /&gt;Rogue detected with my SSIDs - classify as malicious&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Rogue detected with signal -85 - Classify Neigbour and dont worry&lt;/P&gt;
&lt;P&gt;Rogue detected on wire - classify malicous&lt;/P&gt;
&lt;P&gt;Rogue detected with signal better than -75 then have investigated.&lt;/P&gt;
&lt;P&gt;Containement should only be done if the rogue is broadcasting your SSIDs, or is on your wired network - there are legal considerations to containment (&lt;A href="https://edition.cnn.com/2014/10/03/travel/marriott-fcc-wi-fi-fine/index.html" target="_blank"&gt;https://edition.cnn.com/2014/10/03/travel/marriott-fcc-wi-fi-fine/index.html&lt;/A&gt;)&amp;nbsp;&lt;BR /&gt;Also with containment it affects your APs so it should only be done whilst you are physically finding and disconnecting the rogue AP&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jun 2023 22:14:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/rogue-ap-policies-and-best-practices/m-p/4863539#M257544</guid>
      <dc:creator>Haydn Andrews</dc:creator>
      <dc:date>2023-06-27T22:14:31Z</dc:date>
    </item>
  </channel>
</rss>

