<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Any way to shut off WLC syslog %APF-4-ROGUE_AP_ADD_FAILED? in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/any-way-to-shut-off-wlc-syslog-apf-4-rogue-ap-add-failed/m-p/1822988#M45809</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if you're using WCS, which I hope you do, you can specify "Rogue Policies" which should classify the rogues automatically and doing so, reduce your "spam".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can find it under "Controller Template Launch Pad -&amp;gt; Security -&amp;gt; Rogue AP Rules"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unfortunatley, this will not work every time. Have some issues here in my setup as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dirk&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 20 Jan 2012 14:03:59 GMT</pubDate>
    <dc:creator>Dirk Woellhaf</dc:creator>
    <dc:date>2012-01-20T14:03:59Z</dc:date>
    <item>
      <title>Any way to shut off WLC syslog %APF-4-ROGUE_AP_ADD_FAILED?</title>
      <link>https://community.cisco.com/t5/wireless/any-way-to-shut-off-wlc-syslog-apf-4-rogue-ap-add-failed/m-p/1822985#M45806</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does anyone know of a way to shut off syslog traffic for "%APF-4-ROGUE_AP_ADD_FAILED" other than by changing the WLC syslog level?&lt;/P&gt;&lt;P&gt;We need to keep that level (warning level 4) in order to view important warnings.&amp;nbsp; The message noted above is 70% of WLC syslog traffic...way too much.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike Ciulla&lt;/P&gt;</description>
      <pubDate>Sun, 04 Jul 2021 04:24:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/any-way-to-shut-off-wlc-syslog-apf-4-rogue-ap-add-failed/m-p/1822985#M45806</guid>
      <dc:creator>MICHAEL CIULLA</dc:creator>
      <dc:date>2021-07-04T04:24:35Z</dc:date>
    </item>
    <item>
      <title>Any way to shut off WLC syslog %APF-4-ROGUE_AP_ADD_FAILED?</title>
      <link>https://community.cisco.com/t5/wireless/any-way-to-shut-off-wlc-syslog-apf-4-rogue-ap-add-failed/m-p/1822986#M45807</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;did you try to filter it on your Syslog-Receiver? Maybe the easiest way to do it!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dirk&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Jan 2012 13:12:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/any-way-to-shut-off-wlc-syslog-apf-4-rogue-ap-add-failed/m-p/1822986#M45807</guid>
      <dc:creator>Dirk Woellhaf</dc:creator>
      <dc:date>2012-01-20T13:12:26Z</dc:date>
    </item>
    <item>
      <title>Any way to shut off WLC syslog %APF-4-ROGUE_AP_ADD_FAILED?</title>
      <link>https://community.cisco.com/t5/wireless/any-way-to-shut-off-wlc-syslog-apf-4-rogue-ap-add-failed/m-p/1822987#M45808</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Dirk,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your idea is certainly a good one, and may be my only choice, but I'm trying to avoid the network traffic.&amp;nbsp; We have a sprawling campus system the size of a small city and there are lots of other wireless about, so I get about 20k/hr of just this specific log, and mutiply that by 3 for each of the syslog servers.&amp;nbsp; ugh.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, its too much effort to mark all APs as known friendlies per controller, either, which would be another way to reduce this spam alerting.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Jan 2012 13:57:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/any-way-to-shut-off-wlc-syslog-apf-4-rogue-ap-add-failed/m-p/1822987#M45808</guid>
      <dc:creator>MICHAEL CIULLA</dc:creator>
      <dc:date>2012-01-20T13:57:11Z</dc:date>
    </item>
    <item>
      <title>Any way to shut off WLC syslog %APF-4-ROGUE_AP_ADD_FAILED?</title>
      <link>https://community.cisco.com/t5/wireless/any-way-to-shut-off-wlc-syslog-apf-4-rogue-ap-add-failed/m-p/1822988#M45809</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if you're using WCS, which I hope you do, you can specify "Rogue Policies" which should classify the rogues automatically and doing so, reduce your "spam".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can find it under "Controller Template Launch Pad -&amp;gt; Security -&amp;gt; Rogue AP Rules"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unfortunatley, this will not work every time. Have some issues here in my setup as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dirk&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Jan 2012 14:03:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/any-way-to-shut-off-wlc-syslog-apf-4-rogue-ap-add-failed/m-p/1822988#M45809</guid>
      <dc:creator>Dirk Woellhaf</dc:creator>
      <dc:date>2012-01-20T14:03:59Z</dc:date>
    </item>
    <item>
      <title>Any way to shut off WLC syslog %APF-4-ROGUE_AP_ADD_FAILED?</title>
      <link>https://community.cisco.com/t5/wireless/any-way-to-shut-off-wlc-syslog-apf-4-rogue-ap-add-failed/m-p/1822989#M45810</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yeah, we tried that too with WCS. We can classify malicious (unknown AP using our SSIDs) and friendly (known APs another department that we are merging with), but not unclassified, which is where most of them sit.&amp;nbsp; The controllers max out with rogues and dump all the "add failed" spam logs. Looks like we will just filter syslog servers after it traverses the network, as you mentioned.&amp;nbsp; I guess 20k/hr is not that heavy anyway, but it does tie up a some WLC processing power.&amp;nbsp; Was thinking the spam could be dumped right at the controller.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Jan 2012 14:26:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/any-way-to-shut-off-wlc-syslog-apf-4-rogue-ap-add-failed/m-p/1822989#M45810</guid>
      <dc:creator>MICHAEL CIULLA</dc:creator>
      <dc:date>2012-01-20T14:26:07Z</dc:date>
    </item>
  </channel>
</rss>

