<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Air Marshal - Rogue AP detected in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/air-marshal-rogue-ap-detected/m-p/5502501#M301815</link>
    <description>&lt;P&gt;Hi in our organisation we have recently rolled this equipment out on our dozen sites.&lt;/P&gt;&lt;P&gt;I have been tasked with investigating what these rogue AP' are and they seem to all start with "DIRECT-"&lt;/P&gt;&lt;P&gt;I appreciate this is a false alarm and not to waste energy on it. However we would like to know what they are particularly devices or radio chips so that we can ignore them but also advise our users (i.e. devices might not meant to be in the corporate environment etc).&lt;/P&gt;&lt;P&gt;It could be hotspot/tethering, I just want to know what sleuth steps to begin with as the description in the Meraki console is not really helpful other than maybe providing a MAC address.&lt;/P&gt;&lt;P&gt;What tips can you give? Many thanks&lt;/P&gt;&lt;P&gt;G&lt;/P&gt;</description>
    <pubDate>Thu, 20 May 2021 09:40:53 GMT</pubDate>
    <dc:creator>Gareth_</dc:creator>
    <dc:date>2021-05-20T09:40:53Z</dc:date>
    <item>
      <title>Air Marshal - Rogue AP detected</title>
      <link>https://community.cisco.com/t5/wireless/air-marshal-rogue-ap-detected/m-p/5502495#M301809</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I am seeing Air Marshal Rogue AP detected notifications frequently. Please explain why we are receiving these notifications. We are using MR33 access points&lt;/P&gt;</description>
      <pubDate>Wed, 04 Mar 2020 03:58:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/air-marshal-rogue-ap-detected/m-p/5502495#M301809</guid>
      <dc:creator>pavan1989</dc:creator>
      <dc:date>2020-03-04T03:58:34Z</dc:date>
    </item>
    <item>
      <title>Re: Air Marshal - Rogue AP detected</title>
      <link>https://community.cisco.com/t5/wireless/air-marshal-rogue-ap-detected/m-p/5502496#M301810</link>
      <description>&lt;P&gt;It can usually be anything from the radios picking up wifi networks near you or even someone with a hotspot from their phone. I usually look at it from time to time but it's doing what it is suppose to. If Air Marshal is enabled on all AP radios anytime an AP detects it is just trying to tell you something is broadcasting nearby.&lt;/P&gt;</description>
      <pubDate>Wed, 04 Mar 2020 04:03:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/air-marshal-rogue-ap-detected/m-p/5502496#M301810</guid>
      <dc:creator>kYutobi</dc:creator>
      <dc:date>2020-03-04T04:03:15Z</dc:date>
    </item>
    <item>
      <title>Re: Air Marshal - Rogue AP detected</title>
      <link>https://community.cisco.com/t5/wireless/air-marshal-rogue-ap-detected/m-p/5502497#M301811</link>
      <description>Can you provide a screenshot of your Air Marshal page please.&lt;BR /&gt;&lt;BR /&gt;If there is a nearby network broadcasting, and your MR33 hear/see it, then it will show up as 'other SSID'&lt;BR /&gt;&lt;BR /&gt;If something is showing up as Rogue SSID then most likely it is a false positive, this is due to things like MacBooks having that 3rd radio that allows ad-hoc connections, so you'll see DIRECT-* frequently, or if a device like a cell phone is on your network, then leaves, and turns on his own hotspot, then the system will think it was 'Seen on LAN' but it really isn't. Things like that.</description>
      <pubDate>Wed, 04 Mar 2020 04:06:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/air-marshal-rogue-ap-detected/m-p/5502497#M301811</guid>
      <dc:creator>Nolan Herring</dc:creator>
      <dc:date>2020-03-04T04:06:38Z</dc:date>
    </item>
    <item>
      <title>Re: Air Marshal - Rogue AP detected</title>
      <link>https://community.cisco.com/t5/wireless/air-marshal-rogue-ap-detected/m-p/5502498#M301812</link>
      <description>&lt;P&gt;Hello Nolan,&lt;/P&gt;&lt;P&gt;Please find the below screenshot.&lt;/P&gt;&lt;P&gt;&lt;SPAN class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="pavan_1379_0-1583295264182.png" style="width: 400px;"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="image.png"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/269524i0EEDEEA91F865409/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Mar 2020 04:14:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/air-marshal-rogue-ap-detected/m-p/5502498#M301812</guid>
      <dc:creator>pavan1989</dc:creator>
      <dc:date>2020-03-04T04:14:32Z</dc:date>
    </item>
    <item>
      <title>Re: Air Marshal - Rogue AP detected</title>
      <link>https://community.cisco.com/t5/wireless/air-marshal-rogue-ap-detected/m-p/5502499#M301813</link>
      <description>&lt;P&gt;Hp &lt;A href="https://community.meraki.com/t5/user/viewprofilepage/user-id/29618"&gt;@pavan1989&lt;/A&gt; go into the AirMarshal page and into the Rogue APs tab and then click into that 9N_F22B rogue AP, and you should at least see a MAC address, then go to Network Wide &amp;gt; Clients and search on the MAC, see if you can get a little more information about what device is broadcasting that SSID and where it is connected into your LAN and you can also see which AP is detecting its presence.  You might also be seeing devices such as printers that are connected into a wired Ethernet port, but the wireless function is typically on by default and should probably be disabled if the printer is wired.  Also, if mobile devices have been connected to the wifi and subsequently enable a mobile hotspot that can trigger a rogue AP in the logs. It may also be a legitimate AP but part of another system, perhaps during a migration or whatever other reason.  There are other reasons but those are some of the common ones.  Hope that helps!&lt;/P&gt;</description>
      <pubDate>Wed, 04 Mar 2020 05:30:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/air-marshal-rogue-ap-detected/m-p/5502499#M301813</guid>
      <dc:creator>daviscot</dc:creator>
      <dc:date>2020-03-04T05:30:16Z</dc:date>
    </item>
    <item>
      <title>Re: Air Marshal - Rogue AP detected</title>
      <link>https://community.cisco.com/t5/wireless/air-marshal-rogue-ap-detected/m-p/5502500#M301814</link>
      <description>&lt;P&gt;Any chance you have other non Meraki APs in your environment with the same SSID configured?&lt;/P&gt;</description>
      <pubDate>Wed, 04 Mar 2020 07:59:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/air-marshal-rogue-ap-detected/m-p/5502500#M301814</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2020-03-04T07:59:36Z</dc:date>
    </item>
    <item>
      <title>Re: Air Marshal - Rogue AP detected</title>
      <link>https://community.cisco.com/t5/wireless/air-marshal-rogue-ap-detected/m-p/5502501#M301815</link>
      <description>&lt;P&gt;Hi in our organisation we have recently rolled this equipment out on our dozen sites.&lt;/P&gt;&lt;P&gt;I have been tasked with investigating what these rogue AP' are and they seem to all start with "DIRECT-"&lt;/P&gt;&lt;P&gt;I appreciate this is a false alarm and not to waste energy on it. However we would like to know what they are particularly devices or radio chips so that we can ignore them but also advise our users (i.e. devices might not meant to be in the corporate environment etc).&lt;/P&gt;&lt;P&gt;It could be hotspot/tethering, I just want to know what sleuth steps to begin with as the description in the Meraki console is not really helpful other than maybe providing a MAC address.&lt;/P&gt;&lt;P&gt;What tips can you give? Many thanks&lt;/P&gt;&lt;P&gt;G&lt;/P&gt;</description>
      <pubDate>Thu, 20 May 2021 09:40:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/air-marshal-rogue-ap-detected/m-p/5502501#M301815</guid>
      <dc:creator>Gareth_</dc:creator>
      <dc:date>2021-05-20T09:40:53Z</dc:date>
    </item>
    <item>
      <title>Re: Air Marshal - Rogue AP detected</title>
      <link>https://community.cisco.com/t5/wireless/air-marshal-rogue-ap-detected/m-p/5502502#M301816</link>
      <description>&lt;P&gt;&lt;A href="https://community.meraki.com/t5/user/viewprofilepage/user-id/60811"&gt;@Gareth_&lt;/A&gt; &lt;/P&gt;&lt;P&gt;See here:&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.meraki.com/t5/Wireless-LAN/Air-Marshall-Rogue-SSID-s/td-p/39859" target="_blank"&gt;https://community.meraki.com/t5/Wireless-LAN/Air-Marshall-Rogue-SSID-s/td-p/39859&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I recommend you simply whitelist it as such:&lt;/P&gt;&lt;P&gt;&lt;SPAN class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="1111.PNG" style="width: 855px;"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="image.png"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/269520i25A240C6E6C08468/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 20 May 2021 15:20:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/air-marshal-rogue-ap-detected/m-p/5502502#M301816</guid>
      <dc:creator>Nolan Herring</dc:creator>
      <dc:date>2021-05-20T15:20:39Z</dc:date>
    </item>
    <item>
      <title>Re: Air Marshal - Rogue AP detected</title>
      <link>https://community.cisco.com/t5/wireless/air-marshal-rogue-ap-detected/m-p/5502503#M301817</link>
      <description>&lt;P&gt;Awesome, thank you for the info &lt;A href="https://community.meraki.com/t5/user/viewprofilepage/user-id/12351"&gt;@Nolan Herring&lt;/A&gt; \o/&lt;/P&gt;</description>
      <pubDate>Thu, 20 May 2021 15:27:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/air-marshal-rogue-ap-detected/m-p/5502503#M301817</guid>
      <dc:creator>Gareth_</dc:creator>
      <dc:date>2021-05-20T15:27:45Z</dc:date>
    </item>
  </channel>
</rss>

